BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
detection
Google detection

Tag #detection

3932 papers:

POPLPOPL-2020-ZouZXFZS #fault #float
Detecting floating-point errors via atomic conditions (DZ, MZ, YX, ZF, LZ0, ZS), p. 27.
ASPLOSASPLOS-2020-0001SWWKK #debugging #memory management #persistent #source code
Cross-Failure Bug Detection in Persistent Memory Programs (SL0, KS, YW, TFW, AK, SK), pp. 1187–1202.
ICSAICSA-2019-AlamGPAB #framework
A Framework for Tunable Anomaly Detection (MRA, IG, CP, AA, TB), pp. 201–210.
EDMEDM-2019-AlexandronVP #identification #online #towards
Towards a General Purpose Anomaly Detection Method to Identify Cheaters in Massive Open Online Courses (GA, JARV, DEP).
EDMEDM-2019-BotelhoBH #behaviour #re-engineering #student
Machine-Learned or Expert-Engineered Features? Exploring Feature Engineering Methods in Detectors of Student Behavior and Affect (AFB, RSB, NTH).
EDMEDM-2019-GuoB #analysis #collaboration #using
Collaboration Analysis Using Object Detection (ZG, RB).
EDMEDM-2019-HowlinD #approach #behaviour #clustering #fuzzy #student #using
Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDMEDM-2019-JensenHD #dataset #modelling #student
Generalizability of Sensor-Free Affect Detection Models in a Longitudinal Dataset of Tens of Thousands of Students (EJ, SH, SKD).
EDMEDM-2019-OwenRTBJKB #education #effectiveness #game studies #persistent
Detecting Wheel Spinning and Productive Persistence in Educational Games (VEO, MHR, KPT, VB, DJ, EK, RSB).
EDMEDM-2019-ShilloHG #geometry
Detecting Creativity in an Open Ended Geometry Environment (RS, NH, KG).
EDMEDM-2019-SmeetsBB #education
Affect detection in home-based educational software for young children (RS, FLB, EB).
EDMEDM-2019-YangBSHL #learning #student
Active Learning for Student Affect Detection (TYY, RSB, CS, NTH, ASL).
EDMEDM-2019-ZhangHWLFSFHA #comparison #modelling
Early Detection of Wheel Spinning: Comparison across Tutors, Models, Features, and Operationalizations (CZ, YH, JW, DL, WF, JCS, SF, KH, VA).
EDMEDM-2019-ZingleRXGXPKA
Detecting Suggestions in Peer Assessments (GZ, BR, YX, EFG, ZX, FP, GK, AA).
ICPCICPC-2019-AlrubayeM0 #information retrieval #java #library #migration #on the #using
On the use of information retrieval to automate the detection of third-party Java library migration at the method level (HA, MWM, AO0), pp. 347–357.
ICPCICPC-2019-LiuYJZS #clone detection #contract
Enabling clone detection for ethereum via smart contract birthmarks (HL0, ZY, YJ0, WZ, JS), pp. 105–115.
ICPCICPC-2019-MizouchiSII #adaptation #named #online #using
PADLA: a dynamic log level adapter using online phase detection (TM, KS, TI, KI), pp. 135–138.
ICPCICPC-2019-PecorelliPNL #heuristic #machine learning #smell
Comparing heuristic and machine learning approaches for metric-based code smell detection (FP, FP, DDN, ADL), pp. 93–104.
ICPCICPC-2019-YuLCLXW #semantics
Neural detection of semantic code clones via tree-based convolution (HY, WL, LC, GL, TX, QW), pp. 70–80.
ICSMEICSME-2019-AlrubayeM0 #automation #java #library #migration #named
MigrationMiner: An Automated Detection Tool of Third-Party Java Library Migration at the Method Level (HA, MWM, AO0), pp. 414–417.
ICSMEICSME-2019-GaoJJ00G #contract #debugging #named
SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code Embedding (ZG, VJ, LJ, XX0, DL0, JCG), pp. 394–397.
ICSMEICSME-2019-GaoWLYSC #approach #clone detection #named
TECCD: A Tree Embedding Approach for Code Clone Detection (YG, ZW, SL, LY, WS, YC), pp. 145–156.
ICSMEICSME-2019-Imran #analysis #design #java #open source #smell
Design Smell Detection and Analysis for Open Source Java Software (AI), pp. 644–648.
ICSMEICSME-2019-MihanceaS #adaptation #fault
CodeSonar (R) Extension for Copy-Paste-(Mis) Adapt Error Detection (PFM, RS), pp. 386–389.
MSRMSR-2019-AmannNNNM
Investigating next steps in static API-misuse detection (SA, HAN, SN, TNN, MM), pp. 265–275.
MSRMSR-2019-PerezC #abstract syntax tree #clone detection #learning #syntax
Cross-language clone detection by learning over abstract syntax trees (DP, SC), pp. 518–528.
MSRMSR-2019-ScalabrinoBLLO #android #api #data-driven #empirical
Data-driven solutions to detect API compatibility issues in Android: an empirical study (SS, GB, MLV, ML, RO), pp. 288–298.
SANERSANER-2019-ArcelliCP #automation #modelling #performance #refactoring #uml
Automating Performance Antipattern Detection and Software Refactoring in UML Models (DA, VC, DDP), pp. 639–643.
SANERSANER-2019-BuchA #abstract syntax tree #clone detection #recursion #syntax
Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone Detection (LB, AA0), pp. 95–104.
SANERSANER-2019-ChaparroFSM #debugging #query
Reformulating Queries for Duplicate Bug Report Detection (OC, JMF, US, AM), pp. 218–229.
SANERSANER-2019-ChenBJLH #consistency
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers (QLC, JJB, ZMJ, JL, SMH0), pp. 366–376.
SANERSANER-2019-Farmahinifarahani #clone detection #on the #precise #tool support
On Precision of Code Clone Detection Tools (FF, VS, DY, HS, CVL), pp. 84–94.
SANERSANER-2019-Li00LML #android #game studies #image
Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps (WL, YJ0, CX0, YL, XM, JL0), pp. 355–365.
SANERSANER-2019-MaFRWJZLS #online #virtual machine
EVM*: From Offline Detection to Online Reinforcement for Ethereum Virtual Machine (FM, YF, MR, MW, YJ0, KZ, HL, XS), pp. 554–558.
SANERSANER-2019-MuscedereHAADG #analysis #lightweight #using
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
SANERSANER-2019-ThallerLE #design pattern #representation
Feature Maps: A Comprehensible Software Representation for Design Pattern Detection (HT, LL, AE), pp. 207–217.
SANERSANER-2019-WangWZL #multi
Software Multiple-Level Change Detection Based on Two-Step MPAT Matching (TW, DW, YZ, BL), pp. 4–14.
SANERSANER-2019-XiongL #design pattern #implementation #java
Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language Context (RX, BL), pp. 163–174.
SANERSANER-2019-Zhan0T #android #case study #comparative
A Comparative Study of Android Repackaged Apps Detection Techniques (XZ, TZ0, YT), pp. 321–331.
FMFM-2019-SinghPDD #kernel #static analysis
Static Analysis for Detecting High-Level Races in RTOS Kernels (AS, RP, DD, MD), pp. 337–353.
SEFMSEFM-2019-PappTB #behaviour #towards
Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment (DP, TT, LB), pp. 491–509.
SEFMSEFM-2019-StillB #c++ #parallel #source code
Local Nontermination Detection for Parallel C++ Programs (VS, JB), pp. 373–390.
CHI-PLAYCHI-PLAY-2019-GielisVTA #case study #game studies
Age? It's in the Game: An Exploratory Study on Detection of Cognitive Aging through Card Games (KG, KV, JT, VVA), pp. 651–664.
CIKMCIKM-2019-ChenSHG #network
Attention-Residual Network with CNN for Rumor Detection (YC, JS, LH, WG), pp. 1121–1130.
CIKMCIKM-2019-CuiSW0L #named
dEFEND: A System for Explainable Fake News Detection (LC, KS, SW, DL0, HL0), pp. 2961–2964.
CIKMCIKM-2019-DongZHSL #graph #multi #network
Multiple Rumor Source Detection with Graph Convolutional Networks (MD, BZ, NQVH, HS, GL), pp. 569–578.
CIKMCIKM-2019-GiurgiuS #multi
Additive Explanations for Anomalies Detected from Multivariate Temporal Data (IG, AS), pp. 2245–2248.
CIKMCIKM-2019-GongZ00XWH #community #developer #learning #online #using
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning (QG, JZ, YC0, QL0, YX, XW, PH), pp. 1251–1260.
CIKMCIKM-2019-GozuacikBBC #classification #concept
Unsupervised Concept Drift Detection with a Discriminative Classifier (ÖG, AB, HRB, FC), pp. 2365–2368.
CIKMCIKM-2019-HanMNKURNS #image #learning #using
Learning More with Less: Conditional PGGAN-based Data Augmentation for Brain Metastases Detection Using Highly-Rough Annotation on MR Images (CH, KM, TN, YK, FU, LR, HN, SS), pp. 119–127.
CIKMCIKM-2019-HouFZYLWWXS #android #graph #named #robust
αCyber: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model (SH, YF, YZ, YY, JL, WW, JW, QX, FS), pp. 609–618.
CIKMCIKM-2019-HuangYX #graph #learning
System Deterioration Detection and Root Cause Learning on Time Series Graphs (HH, SY, YX), pp. 2537–2545.
CIKMCIKM-2019-HwangYKK #ambiguity #precise
Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling (WSH, JHY, JK, HK), pp. 2241–2244.
CIKMCIKM-2019-JiangWZSLL #graph #learning #representation
Cross-domain Aspect Category Transfer and Detection via Traceable Heterogeneous Graph Representation Learning (ZJ, JW, LZ, CS, YL, XL), pp. 289–298.
CIKMCIKM-2019-LiHLDZ #named #network
SpecAE: Spectral AutoEncoder for Anomaly Detection in Attributed Networks (YL, XH, JL, MD, NZ), pp. 2233–2236.
CIKMCIKM-2019-LiQLYL #graph #network #overview
Spam Review Detection with Graph Convolutional Networks (AL, ZQ, RL, YY, DL), pp. 2703–2711.
CIKMCIKM-2019-MueenCM #metric #social
Taming Social Bots: Detection, Exploration and Measurement (AM, NC, AJM), pp. 2967–2968.
CIKMCIKM-2019-NeutatzMA #fault #learning #named
ED2: A Case for Active Learning in Error Detection (FN, MM, ZA), pp. 2249–2252.
CIKMCIKM-2019-Pasca #approximate #lightweight #wiki
Approximate Definitional Constructs as Lightweight Evidence for Detecting Classes Among Wikipedia Articles (MP), pp. 2373–2376.
CIKMCIKM-2019-ShanahanD #pipes and filters #realtime
Realtime Object Detection via Deep Learning-based Pipelines (JGS, LD), pp. 2977–2978.
CIKMCIKM-2019-ShaposhnikovBGD
Labelling for Venue Visit Detection by Matching Wi-Fi Hotspots with Businesses (DS, AAB, EG, AD), pp. 2281–2284.
CIKMCIKM-2019-SiddiqueeAM #named
SeiSMo: Semi-supervised Time Series Motif Discovery for Seismic Signal Detection (MAS, ZA, AM), pp. 99–108.
CIKMCIKM-2019-TianKA0C #adaptation #concept #health #monitoring #online
Concept Drift Adaption for Online Anomaly Detection in Structural Health Monitoring (HT, NLDK, AA, YW0, FC0), pp. 2813–2821.
CIKMCIKM-2019-TrittenbachB #learning #multi
One-Class Active Learning for Outlier Detection with Multiple Subspaces (HT, KB), pp. 811–820.
CIKMCIKM-2019-YangJGZL #interactive #online
Interactive Variance Attention based Online Spoiler Detection for Time-Sync Comments (WY, WJ, WG, XZ, YL), pp. 1241–1250.
ECIRECIR-p1-2019-GhaderyMSFS #approach #independence #named
LICD: A Language-Independent Approach for Aspect Category Detection (EG, SM, MJS, HF, AS), pp. 575–589.
ECIRECIR-p1-2019-KimA #online
Unsupervised Explainable Controversy Detection from Online News (YK, JA), pp. 836–843.
ECIRECIR-p1-2019-KodeljaBF
Exploiting a More Global Context for Event Detection Through Bootstrapping (DK, RB, OF), pp. 763–770.
ECIRECIR-p2-2019-LosadaCP #internet #risk management
Early Detection of Risks on the Internet: An Exploratory Campaign (DEL, FC, JP), pp. 259–266.
ECIRECIR-p2-2019-PalodPBBG #metadata
Misleading Metadata Detection on YouTube (PP, AP, SB, SB, PG), pp. 140–147.
ECIRECIR-p2-2019-SyedIGSV #induction #learning #natural language #query
Inductive Transfer Learning for Detection of Well-Formed Natural Language Search Queries (BS, VI, MG0, MS0, VV), pp. 45–52.
ICMLICML-2019-ChungL
Weak Detection of Signal in the Spiked Wigner Model (HWC, JOL), pp. 1233–1241.
ICMLICML-2019-Huang0 #algorithm #community #correlation
Detecting Overlapping and Correlated Communities without Pure Nodes: Identifiability and Algorithm (KH, XF0), pp. 2859–2868.
ICMLICML-2019-NguyenLKB #multi #predict
Anomaly Detection With Multiple-Hypotheses Predictions (DTN, ZL, MK, TB), pp. 4800–4809.
ICMLICML-2019-RothKH #statistics
The Odds are Odd: A Statistical Test for Detecting Adversarial Examples (KR, YK, TH), pp. 5498–5507.
ICMLICML-2019-TzengW #distributed #graph
Distributed, Egocentric Representations of Graphs for Detecting Critical Structures (RCT, SHW), pp. 6354–6362.
KDDKDD-2019-ChowdhurySM
Structured Noise Detection: Application on Well Test Pressure Derivative Data (FAC, SS, AM), pp. 2952–2960.
KDDKDD-2019-FauvelMFFT #machine learning #towards
Towards Sustainable Dairy Management - A Machine Learning Enhanced Method for Estrus Detection (KF, VM, ÉF, PF, AT), pp. 3051–3059.
KDDKDD-2019-FedoryszakFRZ #data type #realtime #social
Real-time Event Detection on Social Data Streams (MF, BF, VR, CZ), pp. 2774–2782.
KDDKDD-2019-HulsebosHBZSKDH #approach #data type #learning #named #semantics
Sherlock: A Deep Learning Approach to Semantic Data Type Detection (MH, KZH, MAB, EZ, AS, TK, ÇD, CAH), pp. 1500–1508.
KDDKDD-2019-LiHWL #approach #community #named
EdMot: An Edge Enhancement Approach for Motif-aware Community Detection (PZL, LH, CDW, JHL), pp. 479–487.
KDDKDD-2019-OhI #learning #using
Sequential Anomaly Detection using Inverse Reinforcement Learning (MhO, GI), pp. 1480–1490.
KDDKDD-2019-PangSH #network
Deep Anomaly Detection with Deviation Networks (GP, CS, AvdH), pp. 353–362.
KDDKDD-2019-RamakrishnanSLS #e-commerce
Anomaly Detection for an E-commerce Pricing System (JR, ES, CL, MAS), pp. 1917–1926.
KDDKDD-2019-RenXWYHKXYTZ
Time-Series Anomaly Detection Service at Microsoft (HR, BX, YW, CY, CH, XK, TX, MY, JT, QZ), pp. 3009–3017.
KDDKDD-2019-ShuCW0L #named
dEFEND: Explainable Fake News Detection (KS, LC, SW, DL0, HL0), pp. 395–405.
KDDKDD-2019-SuZNLSP #multi #network #probability #robust
Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network (YS, YZ, CN, RL, WS, DP), pp. 2828–2837.
KDDKDD-2019-TaoLZZWFC #game studies #multi #named #network #online
MVAN: Multi-view Attention Networks for Real Money Trading Detection in Online Games (JT, JL, SZ, SZ, RW, CF, PC), pp. 2536–2546.
KDDKDD-2019-TariqLSLJCW #multi #probability #using
Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA (ST, SL, YS, MSL, OJ, DC, SSW), pp. 2123–2133.
KDDKDD-2019-WagstaffDDACCDP
Enabling Onboard Detection of Events of Scientific Interest for the Europa Clipper Spacecraft (KLW, GD, AD, SA, SC, MC, ID, CAP), pp. 2191–2201.
KDDKDD-2019-XiaLGLCS #case study #mobile #network #privacy #social
Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study (ZX, CL, NZG, QL0, YC0, DS), pp. 2012–2022.
KDDKDD-2019-YelundurCM #composition #multi #overview
Detection of Review Abuse via Semi-Supervised Binary Multi-Target Tensor Decomposition (ARY, VC, BM), pp. 2134–2144.
KDDKDD-2019-YoonHSF #approach #graph #performance
Fast and Accurate Anomaly Detection in Dynamic Graphs with a Two-Pronged Approach (MY, BH, KS, CF), pp. 647–657.
KDDKDD-2019-ZafaraniZSL #problem #research
Fake News Research: Theories, Detection Strategies, and Open Problems (RZ, XZ, KS, HL0), pp. 3207–3208.
KDDKDD-2019-ZhaoWSNHJSNBRPL #power management #smarttech
Raise to Speak: An Accurate, Low-power Detector for Activating Voice Assistants on Smartwatches (SZ, BW, SS, HN, RH, MJ, KS, BN, MB, SR, TP, KL, CG), pp. 2736–2744.
KDDKDD-2019-ZheSX #community #network #scalability
Community Detection on Large Complex Attribute Network (CZ, AS, XX), pp. 2041–2049.
OOPSLAOOPSLA-2019-GencRXB #bound #concurrent #predict
Dependence-aware, unbounded sound predictive race detection (KG, JR, YX, MDB), p. 30.
OOPSLAOOPSLA-2019-LiWNN #debugging #learning #network #representation
Improving bug detection via context-based code representation learning and attention-based neural networks (YL, SW0, TNN, SVN), p. 30.
OOPSLAOOPSLA-2019-SongLO #automation #fault #functional #logic #programming #scalability
Automatic and scalable detection of logical errors in functional programming assignments (DS, ML, HO), p. 30.
OOPSLAOOPSLA-2019-WangZS #contract #debugging #nondeterminism
Detecting nondeterministic payment bugs in Ethereum smart contracts (SW, CZ, ZS), p. 29.
PLDIPLDI-2019-KhanZPMK #hybrid #named
Huron: hybrid false sharing detection and repair (TAK, YZ, GP, BM, BK), pp. 453–468.
POPLPOPL-2019-GorogiannisOS #theorem
A true positives theorem for a static race detector (NG, PWO, IS), p. 29.
ASEASE-2019-FengYLBWTSYXPXH #named #off the shelf #open source #reuse
B2SFinder: Detecting Open-Source Software Reuse in COTS Software (MF, ZY, FL, GB, SW, QT, HS, CY, JX, AP, JX, WH), pp. 1038–1049.
ASEASE-2019-HortonP #named #performance #python
V2: Fast Detection of Configuration Drift in Python (EH, CP), pp. 477–488.
ASEASE-2019-JiaLYLWLL #debugging #fault #specification
Detecting Error-Handling Bugs without Error Specification Input (ZJ, SL, TY, XL, JW, XL, YL), pp. 213–225.
ASEASE-2019-Kellogg #image
Compile-Time Detection of Machine Image Sniping (MK), pp. 1256–1258.
ASEASE-2019-Laguna #exception #float #gpu #named
FPChecker: Detecting Floating-Point Exceptions in GPU Applications (IL), pp. 1126–1129.
ASEASE-2019-LiuW0B0X #android #named
DaPanda: Detecting Aggressive Push Notifications in Android Apps (TL, HW, LL0, GB, YG0, GX), pp. 66–78.
ASEASE-2019-LiW0ZCM #clustering #effectiveness #fault #named #spreadsheet
SGUARD: A Feature-Based Clustering Tool for Effective Spreadsheet Defect Detection (DL, HW, CX0, RZ, SCC, XM), pp. 1142–1145.
ASEASE-2019-MengZYL0Y #concurrent #effectiveness #named
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities (RM, BZ, HY, HL, YC0, ZY), pp. 1154–1157.
ASEASE-2019-NafiKRRS #api #clone detection #documentation #named #using
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ASEASE-2019-PiskachevDJB #automation #named
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods (GP, LNQD, OJ, EB), pp. 1094–1097.
ASEASE-2019-Xiao #android #approach
An Image-Inspired and CNN-Based Android Malware Detection Approach (XX), pp. 1259–1261.
ASEASE-2019-ZhengLZLZD #feedback #named #online #realtime #scalability
iFeedback: Exploiting User Feedback for Real-Time Issue Detection in Large-Scale Online Service Systems (WZ, HL, YZ, JL, HZ, YD), pp. 352–363.
ESEC-FSEESEC-FSE-2019-AwadhutkarSHK #algorithm #complexity #named
DISCOVER: detecting algorithmic complexity vulnerabilities (PA, GRS, BH, SK), pp. 1129–1133.
ESEC-FSEESEC-FSE-2019-BiagiolaSMRT #dependence #web
Web test dependency detection (MB, AS, AM, FR, PT), pp. 154–164.
ESEC-FSEESEC-FSE-2019-CaiZMYHSL #concurrent #memory management
Detecting concurrency memory corruption vulnerabilities (YC, BZ, RM, HY, LH, PS, BL0), pp. 706–717.
ESEC-FSEESEC-FSE-2019-FuRMSYJLS #named #testing
EVMFuzzer: detect EVM vulnerabilities via fuzz testing (YF, MR, FM, HS, XY, YJ0, HL, XS), pp. 1110–1114.
ESEC-FSEESEC-FSE-2019-He19a #comprehension #debugging #fault #performance
Tuning backfired? not (always) your fault: understanding and detecting configuration-related performance bugs (HH), pp. 1229–1231.
ESEC-FSEESEC-FSE-2019-JiaLYLW #automation
Automatically detecting missing cleanup for ungraceful exits (ZJ, SL, TY, XL, JW), pp. 751–762.
ESEC-FSEESEC-FSE-2019-KimHK #composition #debugging #effectiveness #refinement #summary #testing
Target-driven compositional concolic testing with function summary refinement for effective bug detection (YK, SH, MK), pp. 16–26.
ESEC-FSEESEC-FSE-2019-LiXCWZXWL #adaptation #effectiveness #fuzzing #named
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection (YL, YX, HC, XW, CZ, XX, HW, YL0), pp. 533–544.
ESEC-FSEESEC-FSE-2019-MordahlOKWG #debugging #empirical #tool support #variability
An empirical study of real-world variability bugs detected by variability-oblivious tools (AM, JO, UK, SW, PG), pp. 50–61.
ESEC-FSEESEC-FSE-2019-SongZH #android #named
ServDroid: detecting service usage inefficiencies in Android applications (WS0, JZ, JH0), pp. 362–373.
ESEC-FSEESEC-FSE-2019-Sonnekalb #source code
Machine-learning supported vulnerability detection in source code (TS), pp. 1180–1183.
ESEC-FSEESEC-FSE-2019-StallenbergP #injection #named #search-based #web #xml
JCOMIX: a search-based tool to detect XML injection vulnerabilities in web applications (DMS, AP), pp. 1090–1094.
ESEC-FSEESEC-FSE-2019-ZhangXLQZDXYCLC #robust
Robust log-based anomaly detection on unstable log data (XZ, YX, QL, BQ, HZ0, YD, CX, XY, QC, ZL, JC0, XH, RY, JGL, MC, FS, DZ), pp. 807–817.
ICSE-2019-AryaWGC #analysis #open source
Analysis and detection of information types of open source software issue discussions (DA, WW, JLCG, JC), pp. 454–464.
ICSE-2019-ChangDGW0H
Detecting atomicity violations for event-driven Node.js applications (XC, WD, YG, JW, JW0, TH0), pp. 631–642.
ICSE-2019-FanWS0ZZ #memory management #named #scalability
Smoke: scalable path-sensitive memory leak detection for millions of lines of code (GF, RW, QS, XX0, JZ, CZ), pp. 72–82.
ICSE-2019-GhorbaniGM #architecture #consistency #java #nondeterminism
Detection and repair of architectural inconsistencies in Java (NG, JG, SM), pp. 560–571.
ICSE-2019-LiC0S #named #smell
Dlfinder: characterizing and detecting duplicate logging code smells (ZL, TH(C, JY0, WS), pp. 152–163.
ICSE-2019-LickerR
Detecting incorrect build rules (NL, AR), pp. 1234–1244.
ICSE-2019-PhamLQT #debugging #learning #library #locality #named #validation
CRADLE: cross-backend validation to detect and localize bugs in deep learning libraries (HVP, TL, WQ, LT0), pp. 1027–1038.
ICSE-2019-SainiFLY0SBL #automation #clone detection #precise #towards
Towards automating precision studies of clone detectors (VS, FF, YL, DY, PM0, HS, PB, CVL), pp. 49–59.
ICSE-2019-WangD00Z #mutation testing #network #testing
Adversarial sample detection for deep neural network through model mutation testing (JW, GD, JS0, XW0, PZ), pp. 1245–1256.
ICSE-2019-WeiLC #android #correlation #learning #named
Pivot: learning API-device correlations to facilitate Android compatibility issue detection (LW, YL, SCC), pp. 878–888.
SLESLE-2019-KhelladiKE #consistency #nondeterminism
Detecting and exploring side effects when repairing model inconsistencies (DEK, RK, AE), pp. 113–126.
ASPLOSASPLOS-2019-BaiLTH #automation #fault #kernel #linux #named
DCNS: Automated Detection Of Conservative Non-Sleep Defects in the Linux Kernel (JJB, JL, WT, SMH0), pp. 287–299.
ASPLOSASPLOS-2019-OsterlundKOBBG #execution #kernel #multi #named
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution (, KK, PO, AB, HB, CG), pp. 559–572.
CASECASE-2019-0003L
Supervisory Control for Delayed Detectability of Discrete Event Systems (XY0, SL), pp. 480–485.
CASECASE-2019-AdamidesMKS #collaboration #proximity
A Time-of-Flight On-Robot Proximity Sensing System to Achieve Human Detection for Collaborative Robots (OAA, ASM, SK, FS), pp. 1230–1236.
CASECASE-2019-AhmedG0 #approach #generative #named #online
O-LoMST: An Online Anomaly Detection Approach And Its Application In A Hydropower Generation Plant (IA, TG, YD0), pp. 762–767.
CASECASE-2019-AzefackPAGCBX #approach #behaviour #smarttech
An Approach for Behavioral Drift Detection in a Smart Home (CA, RP, VA, GG, CMC, RB, XX), pp. 727–732.
CASECASE-2019-BaltaTB #framework #modelling #monitoring #performance
A Digital Twin Framework for Performance Monitoring and Anomaly Detection in Fused Deposition Modeling (ECB, DMT, KB), pp. 823–829.
CASECASE-2019-ChangLH #coordination #network #realtime #using
Real-Time Object Coordinate Detection and Manipulator Control Using Rigidly Trained Convolutional Neural Networks (YMC, CHGL, YFH), pp. 1347–1352.
CASECASE-2019-ChengJM #monitoring #process #robust
Data-Efficient Process Monitoring and Failure Detection for Robust Robotic Screwdriving (XC, ZJ, MTM), pp. 1705–1711.
CASECASE-2019-CrowleyZAS #predict
Set-Based Predictive Control for Collision Detection and Evasion (JC, YZ, BA, RGS), pp. 541–546.
CASECASE-2019-HenniSLR #framework
Improved dynamic object detection within evidential grids framework (AHH, AS, RL, NR), pp. 1080–1086.
CASECASE-2019-HeWDZB #adaptation #fault
An Adaptive Interval Forecast CNN Model for Fault Detection Method (JH, JW, LD, JZ, JB), pp. 602–607.
CASECASE-2019-KazmiNVRC #learning #recognition #using
Vehicle tire (tyre) detection and text recognition using deep learning (WK, IN, GV, PR, AC), pp. 1074–1079.
CASECASE-2019-LaiL #learning #using
Video-Based Windshield Rain Detection and Wiper Control Using Holistic-View Deep Learning (CCL, CHGL), pp. 1060–1065.
CASECASE-2019-LiGZYWSZ #fault #using
Detection model of invisible weld defects using magneto-optical imaging induced by rotating magnetic field (YL, XG, YZ, DY, CW, YS, NZ), pp. 1–5.
CASECASE-2019-Morales-ValdezL
Damage detection of building structure based on vibration data and hysteretic model (JMV, MAL, WY), pp. 608–613.
CASECASE-2019-NiuLNLW #fault #generative #named #network #using
DefectGAN: Weakly-Supervised Defect Detection using Generative Adversarial Network (SN, HL, TN, BL, XW), pp. 127–132.
CASECASE-2019-PengZZZ #analysis #component #fault #kernel #markov #multi #process
Hidden Markov Model Combined with Kernel Principal Component Analysis for Nonlinear Multimode Process Fault Detection (PP, JZ, YZ, HZ), pp. 1586–1591.
CASECASE-2019-PerdomoPMMKP #2d #named #performance
c-M2DP: A Fast Point Cloud Descriptor with Color Information to Perform Loop Closure Detection (LP, DP, MM, RM, MLK, EP), pp. 1145–1150.
CASECASE-2019-PotluriD #injection #learning #performance #process
Deep Learning based Efficient Anomaly Detection for Securing Process Control Systems against Injection Attacks (SP, CD), pp. 854–860.
CASECASE-2019-SunLY #network #using
Railway Joint Detection Using Deep Convolutional Neural Networks (YS, YL, CY), pp. 235–240.
CASECASE-2019-TaheritanjaniSB #automation #process
Automatic Damage Detection of Fasteners in Overhaul Processes (ST, RS, BB), pp. 1289–1295.
CASECASE-2019-WuMDXTIC #2d #automation #estimation #multi
Multi-Mosquito Object Detection and 2D Pose Estimation for Automation of PfSPZ Malaria Vaccine Production (HW, JM, TD, MX, RHT, II, GSC), pp. 411–417.
CASECASE-2019-XiaoH0HZ #fault #using
Surface Defect Detection using Hierarchical Features (LX, TH, BW0, YH, JZ), pp. 1592–1596.
CASECASE-2019-XuGWBCS #image
U-Net with optimal thresholding for small blob detection in medical images (YX, FG0, TW, KMB, JRC, SS), pp. 1761–1767.
CASECASE-2019-YanYS #fault #monitoring #process
Image-based Process Monitoring via Adversarial Autoencoder with Applications to Rolling Defect Detection (HY, HMY, NS), pp. 311–316.
CASECASE-2019-ZhangCZXL #fault #learning
Weld Defect Detection Based on Deep Learning Method (HZ, ZC, CZ, JX, XL), pp. 1574–1579.
CASECASE-2019-Zhao0Z #fault
Detecting Intermittent Faults with Moving Average Techniques (YZ, XH0, DZ), pp. 1712–1717.
CGOCGO-2019-LiuSWDL #named
CSOD: Context-Sensitive Overflow Detection (HL, SS, XW, LD, TL), pp. 50–60.
FASEFASE-2019-NicholsEH #clone detection
Structural and Nominal Cross-Language Clone Detection (LN, ME, BH), pp. 247–263.
ICSTICST-2019-LamOSM0 #framework #named #testing
iDFlakies: A Framework for Detecting and Partially Classifying Flaky Tests (WL, RO, AS, DM, TX0), pp. 312–322.
ICSTICST-2019-MonniPP
An RBM Anomaly Detector for the Cloud (CM, MP, GP), pp. 148–159.
ICSTICST-2019-WuLSCX #analysis #android #order #precise
Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android (DW, JL0, YS, SC0, JX), pp. 276–287.
ICTSSICTSS-2019-VinarskiiLKYZ #approach #model checking
A Model Checking Based Approach for Detecting SDN Races (EV, JL, NK, NY, DZ), pp. 194–211.
JCDLJCDL-2018-MeuschkeGSBKG #adaptation #approach
An Adaptive Image-based Plagiarism Detection Approach (NM, CG, DS, CB, DAK, BG), pp. 131–140.
EDMEDM-2018-BotelhoBOH #using
Studying Affect Dynamics and Chronometry Using Sensor-Free Detectors (AFB, RSB, JO, NTH).
ICPCICPC-2018-GaoMSSZMMDDZC #c #c++ #debugging #named
CoBOT: static C/C++ bug detection in the presence of incomplete code (QG, SM, SS, YS, GZ, LM, XM, FD, XD, SZ, XC), pp. 385–388.
ICPCICPC-2018-MaL0T0L #android #named
LESdroid: a tool for detecting exported service leaks of Android applications (JM0, SL, YJ0, XT, CX0, JL0), pp. 244–254.
ICSMEICSME-2018-IshioMSI #distance #normalisation #using
Cloned Buggy Code Detection in Practice Using Normalized Compression Distance (TI, NM, KS, KI), pp. 591–594.
ICSMEICSME-2018-JansenHT #case study #energy #evolution #network #predict #spreadsheet
Detecting and Predicting Evolution in Spreadsheets - A Case Study in an Energy Network Company (BJ, FH, ET), pp. 645–654.
ICSMEICSME-2018-KissM #design #towards
Towards Feature Envy Design Flaw Detection at Block Level (ÁK, PFM), pp. 544–548.
ICSMEICSME-2018-PalombaZL #automation #information retrieval #smell #using
Automatic Test Smell Detection Using Information Retrieval Techniques (FP, AZ, ADL), pp. 311–322.
ICSMEICSME-2018-YueSMT00 #android #named #runtime #user interface
RegionDroid: A Tool for Detecting Android Application Repackaging Based on Runtime UI Region Features (SY, QS, JM0, XT, CX0, JL0), pp. 323–333.
MSRMSR-2018-CiborowskaKD #behaviour #developer #reuse #using #web
Detecting and characterizing developer behavior following opportunistic reuse of code snippets from the web (AC, NAK, KD), pp. 94–97.
MSRMSR-2018-NayrollesH #clone detection #fault #industrial #metric #named #scalability
CLEVER: combining code metrics with clone detection for just-in-time fault prevention and resolution in large industrial projects (MN, AHL), pp. 153–164.
MSRMSR-2018-Soto-ValeroBB #analysis #behaviour #debugging #process
Detection and analysis of behavioral T-patterns in debugging activities (CSV, JB, BB), pp. 110–113.
SANERSANER-2018-BritoXHV18a #api #named
APIDiff: Detecting API breaking changes (AB, LX, ACH, MTV), pp. 507–511.
SANERSANER-2018-FakhouryANKA #learning #question #smell
Keep it simple: Is deep learning good for linguistic smell detection? (SF, VA, CN, FK, GA), pp. 602–611.
SANERSANER-2018-LaverdiereM #evolution
Detection of protection-impacting changes during software evolution (MAL, EM), pp. 434–444.
SANERSANER-2018-NucciPTSL #machine learning #question #smell #using
Detecting code smells using machine learning techniques: Are we there yet? (DDN, FP, DAT, AS, ADL), pp. 612–621.
SANERSANER-2018-RoyC #benchmark #clone detection #metric
Benchmarks for software clone detection: A ten-year retrospective (CKR, JRC), pp. 26–37.
SANERSANER-2018-SantosCPHA #fault #modelling #syntax #using
Syntax and sensibility: Using language models to detect and correct syntax errors (EAS, JCC, DP, AH, JNA), pp. 311–322.
SANERSANER-2018-SilvaPM #stack overflow
Duplicate question detection in stack overflow: A reproducibility study (RFGdS, KVRP, MdAM), pp. 572–581.
SANERSANER-2018-VislavskiRCB #clone detection #named
LICCA: A tool for cross-language clone detection (TV, GR, NC, ZB), pp. 512–516.
SANERSANER-2018-XuWDYG00 #spreadsheet
Detecting faulty empty cells in spreadsheets (LX, SW, WD, BY, CG, JW0, TH0), pp. 423–433.
SANERSANER-2018-ZhangDZHYY0 #android #library #precise
Detecting third-party libraries in Android applications with high precision and recall (YZ0, JD, XZ, SH, ZY, MY0, HC0), pp. 141–152.
SCAMSCAM-2018-IslamIMRRS #research #transitive #using
[Research Paper] Detecting Evolutionary Coupling Using Transitive Association Rules (MAI, MMI, MM, BR, CKR, KAS), pp. 113–122.
SCAMSCAM-2018-KoschkeSB #clone detection
[Engineering Paper] Built-in Clone Detection in Meta Languages (RK, UBS, BJB), pp. 165–170.
SCAMSCAM-2018-NafiRRS #api #documentation #research #similarity #using
[Research Paper] CroLSim: Cross Language Software Similarity Detector Using API Documentation (KWN, BR, CKR, KAS), pp. 139–148.
SCAMSCAM-2018-SakuraiAG #concurrent #parallel #research
[Research Paper] POI: Skew-Aware Parallel Race Detection (YS, YA, KG), pp. 215–224.
SCAMSCAM-2018-SasBF #automation #java #library #research
[Research Paper] Automatic Detection of Sources and Sinks in Arbitrary Java Libraries (DS, MB, FAF), pp. 103–112.
FMFM-2018-AzadbakhtBV #concurrent
Deadlock Detection for Actor-Based Coroutines (KA, FSdB, EPdV), pp. 39–54.
FDGFDG-2018-RingerN #game studies #multi #video
Deep unsupervised multi-view detection of video game stream highlights (CR, MAN), p. 6.
CIKMCIKM-2018-AllerhandYYA #interactive #question
Detecting Parkinson's Disease from Interactions with a Search Engine: Is Expert Knowledge Sufficient? (LIA, BY, EYT, DA), pp. 1539–1542.
CIKMCIKM-2018-CaoCCTLL #assessment #behaviour #community #enterprise #network
Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks (CC, ZC, JC, LAT, CL, ZL), pp. 1977–1985.
CIKMCIKM-2018-ChenXM #framework #social #social media
An Encoder-Memory-Decoder Framework for Sub-Event Detection in Social Media (GC, NX, WM), pp. 1575–1578.
CIKMCIKM-2018-DeutchGM #privacy #using
Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
CIKMCIKM-2018-FanSW #network
Abnormal Event Detection via Heterogeneous Information Network Embedding (SF, CS, XW0), pp. 1483–1486.
CIKMCIKM-2018-GuoCZGL #network #social
Rumor Detection with Hierarchical Social Attention Network (HG, JC, YZ, JG, JL), pp. 943–951.
CIKMCIKM-2018-HoangVN #benchmark #dataset #metric #named #topic
W2E: A Worldwide-Event Benchmark Dataset for Topic Detection and Tracking (TAH, KDV, WN), pp. 1847–1850.
CIKMCIKM-2018-HooiAEPJPF #graph #locality #named #online
ChangeDAR: Online Localized Change Detection for Sensor Data on a Graph (BH, LA, DE, AP, MJ, LTP, CF), pp. 507–516.
CIKMCIKM-2018-KuoLK #correlation #metric
Detecting Outliers in Data with Correlated Measures (YHK, ZL, DK), pp. 287–296.
CIKMCIKM-2018-LinCCT0CL #collaboration #ranking
Collaborative Alert Ranking for Anomaly Detection (YL, ZC, CC, LAT, KZ0, WC, ZL), pp. 1987–1995.
CIKMCIKM-2018-LinmansVK #robust #scalability #semantics #using #web
Improved and Robust Controversy Detection in General Web Pages Using Semantic Approaches under Large Scale Conditions (JL, BvdV, EK), pp. 1647–1650.
CIKMCIKM-2018-LiuCYZLS #graph #network
Heterogeneous Graph Neural Networks for Malicious Account Detection (ZL, CC, XY, JZ, XL, LS), pp. 2077–2085.
CIKMCIKM-2018-ShaabaniM #dependence #performance
Improving the Efficiency of Inclusion Dependency Detection (NS, CM), pp. 207–216.
CIKMCIKM-2018-TangTDJG #on the #realtime
On Real-time Detecting Passenger Flow Anomalies (BT, HT, XD, BJ, TG), pp. 1053–1062.
CIKMCIKM-2018-WangSZWL #multi
Multi-View Group Anomaly Detection (HW, PS, MZ, HW, GL), pp. 277–286.
CIKMCIKM-2018-WuWL18a #collaboration #learning #microblog #social
Semi-Supervised Collaborative Learning for Social Spammer and Spam Message Detection in Microblogging (FW, CW, JL), pp. 1791–1794.
CIKMCIKM-2018-XuWCWM #category theory #set
Exploring a High-quality Outlying Feature Value Set for Noise-Resilient Outlier Detection in Categorical Data (HX, YW, LC, YW, XM), pp. 17–26.
CIKMCIKM-2018-YeCZ #community #matrix
Deep Autoencoder-like Nonnegative Matrix Factorization for Community Detection (FY, CC, ZZ), pp. 1393–1402.
CIKMCIKM-2018-Zhang0T
Smooth q-Gram, and Its Applications to Detection of Overlaps among Long, Error-Prone Sequencing Reads (HZ, QZ0, HT), pp. 267–276.
CIKMCIKM-2018-ZhongS0 #automation #multi #privacy #towards
Toward Automated Multiparty Privacy Conflict Detection (HZ, ACS, DJM0), pp. 1811–1814.
ECIRECIR-2018-0001TJ
To Cite, or Not to Cite? Detecting Citation Contexts in Text (MF0, AT, AJ), pp. 598–603.
ECIRECIR-2018-AgrawalA #learning #multi #platform #social #social media
Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms (SA, AA), pp. 141–153.
ECIRECIR-2018-DeySK #topic #twitter #using
Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention (KD, RS, SK), pp. 529–536.
ECIRECIR-2018-FaniBZBA #streaming
Stopword Detection for Streaming Content (HF, MB, FZ, EB, FAO), pp. 737–743.
ECIRECIR-2018-Martinez-Castano #approach #modelling #realtime #social #social media
A Micromodule Approach for Building Real-Time Systems with Python-Based Models: Application to Early Risk Detection of Depression on Social Media (RMC, JCP, DEL, FC), pp. 801–805.
ECIRECIR-2018-MeladianosXNV #approach #optimisation #summary #twitter
An Optimization Approach for Sub-event Detection and Summarization in Twitter (PM, CX, GN, MV), pp. 481–493.
ECIRECIR-2018-StihecZP #approach #hybrid #semantics
Simplified Hybrid Approach for Detection of Semantic Orientations in Economic Texts (JS, MZ, SP), pp. 692–698.
ECIRECIR-2018-TrikhaZB #mining #topic
Topic-Association Mining for User Interest Detection (AKT, FZ, EB), pp. 665–671.
ICMLICML-2018-BoracchiCCM #data type #multi #named
QuantTree: Histograms for Change Detection in Multivariate Data Streams (GB, DC, CC, DM), pp. 638–647.
ICMLICML-2018-JanzingS #linear #modelling #multi
Detecting non-causal artifacts in multivariate linear regression models (DJ, BS), pp. 2250–2258.
ICMLICML-2018-KnoblauchD #online
Spatio-temporal Bayesian On-line Changepoint Detection with Model Selection (JK, TD), pp. 2723–2732.
ICMLICML-2018-LiptonWS #black box #predict
Detecting and Correcting for Label Shift with Black Box Predictors (ZCL, YXW, AJS), pp. 3128–3136.
ICMLICML-2018-LiuGDFH
Open Category Detection with PAC Guarantees (SL, RG, TGD, AF, DH), pp. 3175–3184.
ICMLICML-2018-MazharRFH #clustering
Bayesian Model Selection for Change Point Detection and Clustering (OM, CRR, CF, MRH), pp. 3430–3439.
ICPRICPR-2018-AbdeldayemB #automation #using
Automatically Detecting Arrhythmia-related Irregular Patterns using the Temporal and Spectro-Temporal Textures of ECG Signals (SSA, TB), pp. 2301–2307.
ICPRICPR-2018-AbdeltawabSSMEG #3d
A New 3D CNN-based CAD System for Early Detection of Acute Renal Transplant Rejection (HA, MS, AS0, SM, MEB, MG, YA, MAEG, ACD, MTEM, AEB), pp. 3898–3903.
ICPRICPR-2018-AlshawaqfehKS #robust
Robust Fussed Lasso Model for Recurrent Copy Number Variation Detection (MA, AAK, ES), pp. 3772–3777.
ICPRICPR-2018-AnnadaniJ #adaptation #approach #image
Augment and Adapt: A Simple Approach to Image Tampering Detection (YA, CVJ), pp. 2983–2988.
ICPRICPR-2018-ArtaudSDOD #contest #exclamation
Find it! Fraud Detection Contest Report (CA, NS, AD, JMO, VPD), pp. 13–18.
ICPRICPR-2018-BallottaBVC #image #network
Fully Convolutional Network for Head Detection with Depth Images (DB, GB, RV, RC), pp. 752–757.
ICPRICPR-2018-CaoGWXW #learning
Gaze-Aided Eye Detection via Appearance Learning (LC, CG, KW, GX, FYW0), pp. 1965–1970.
ICPRICPR-2018-CaoLL0JJC #image #learning
Deep Learning Based Bioresorbable Vascular Scaffolds Detection in IVOCT Images (YC, YL, JL, RZ0, QJ, JJ, YC), pp. 3778–3783.
ICPRICPR-2018-CaoLZSLS #named #network #performance
ThinNet: An Efficient Convolutional Neural Network for Object Detection (SC, YL, CZ, QSS, PL, SS), pp. 836–841.
ICPRICPR-2018-ChenHZLQ #analysis #multi #video
Video Salient Object Detection via Multiple Time-scale Analysis (YC, LH, WZ, XL, GQ), pp. 2184–2189.
ICPRICPR-2018-ChenLT #algorithm #approximate #memory management
An Approximate Bayesian Long Short- Term Memory Algorithm for Outlier Detection (CC, XL, GT), pp. 201–206.
ICPRICPR-2018-DahlDTG
Layered Surface Detection for Virtual Unrolling (VAD, ABD, CHT, CG), pp. 3074–3080.
ICPRICPR-2018-DaiHGX0GQ #multi #network #segmentation
Fused Text Segmentation Networks for Multi-oriented Scene Text Detection (YD, ZH, YG, YX, KC0, JG, WQ), pp. 3604–3609.
ICPRICPR-2018-DehzangiBI #multi #process #using
Activity Detection using Fusion of Multi-Pressure Sensors in Insoles (OD, BAB, OI), pp. 3315–3321.
ICPRICPR-2018-DehzangiT #network #representation #using
Driver Distraction Detection using MEL Cepstrum Representation of Galvanic Skin Responses and Convolutional Neural Networks (OD, MT), pp. 1481–1486.
ICPRICPR-2018-DengLLZL #composition #rank
Low-Rank and Sparse Decomposition on Contrast Map for Small Infrared Target Detection (XD, WL0, LL, WZ, XL), pp. 2682–2687.
ICPRICPR-2018-DingLZ #framework
A Selective Tracking and Detection Framework with Target Enhanced Feature (XD, LL, XZ), pp. 1924–1928.
ICPRICPR-2018-DingZXBBLDPZ #contest #image
ICPR2018 Contest on Object Detection in Aerial Images (ODAI-18) (JD, ZZ, GSX, XB, SJB, JL, MD, MP, LZ), pp. 1–6.
ICPRICPR-2018-FengHYL #segmentation
Scene Text Detection with Recurrent Instance Segmentation (WF, WH, FY, CLL), pp. 2227–2232.
ICPRICPR-2018-FuGA #learning #scalability
Simultaneous Context Feature Learning and Hashing for Large Scale Loop Closure Detection (ZF, YG, WA), pp. 1689–1694.
ICPRICPR-2018-FuWZ #image
Context-Aware and Depthwise-based Detection on Orbit for Remote Sensing Image (YF, FW, JZ), pp. 1725–1730.
ICPRICPR-2018-GalteriBSB #algorithm #video
Video Compression for Object Detection Algorithms (LG, MB, LS, ADB), pp. 3007–3012.
ICPRICPR-2018-GuoDGB #multi #named
MSFD: Multi-Scale Receptive Field Face Detector (QG, YD, YG, HB), pp. 1869–1874.
ICPRICPR-2018-GuptaJAMM #video
Pentuplet Loss for Simultaneous Shots and Critical Points Detection in a Video (NG, AJ, PA, SM, SM), pp. 2392–2397.
ICPRICPR-2018-JiangZWYLWFL
R2 CNN: Rotational Region CNN for Arbitrarily-Oriented Scene Text Detection (YJ, XZ, XW, SY, WL, HW, PF, ZL), pp. 3610–3615.
ICPRICPR-2018-JinZWJ #behaviour #clustering #representation
Sparse Representation and Weighted Clustering Based Abnormal Behavior Detection (DJ, SZ, SW, XYJ), pp. 1574–1579.
ICPRICPR-2018-KataokaOIS #image
Occlusion Handling Human Detection with Refocused Images (HK, SO, KI, YS), pp. 1701–1706.
ICPRICPR-2018-LiaoZWN #named #network #recognition
Uniface: A Unified Network for Face Detection and Recognition (ZL, PZ, QW, BN), pp. 3531–3536.
ICPRICPR-2018-LiCZC #network
Mammographic mass detection based on convolution neural network (YL, HC, LZ, LC), pp. 3850–3855.
ICPRICPR-2018-LiW18a #semantics #using #visual notation
Visual Relationship Detection Using Joint Visual-Semantic Embedding (BL, YW0), pp. 3291–3296.
ICPRICPR-2018-LiYL #clustering #documentation #image #predict
Page Object Detection from PDF Document Images by Deep Structured Prediction and Supervised Clustering (XL, FY, CLL), pp. 3627–3632.
ICPRICPR-2018-LuLLZZ #fuzzy
Botnet Detection based on Fuzzy Association Rules (JL, FL, QHL, MZ, XZ), pp. 578–584.
ICPRICPR-2018-LyuYCZZ #classification #learning
Learning Fixation Point Strategy for Object Detection and Classification (JL0, ZY, DC, YZ, HZ), pp. 2081–2086.
ICPRICPR-2018-MaSLGX #image #novel
A Novel Two-Stage Deep Method for Mitosis Detection in Breast Cancer Histology Images (MM, YS, WL, YG0, JX), pp. 3892–3897.
ICPRICPR-2018-MaWWW #multi #named #network #performance
MDCN: Multi-Scale, Deep Inception Convolutional Neural Networks for Efficient Object Detection (WM, YW, ZW, GW), pp. 2510–2515.
ICPRICPR-2018-MeiJSH #dependence #multi
Region and Temporal Dependency Fusion for Multi-label Action Unit Detection (CM, FJ, RS, QH), pp. 848–853.
ICPRICPR-2018-MingCLVB #interactive #liveness #named #network #verification
FaceLiveNet: End-to-End Networks Combining Face Verification with Interactive Facial Expression-Based Liveness Detection (ZM, JC, MML, MV, JCB), pp. 3507–3512.
ICPRICPR-2018-MohantyDG #performance #using
An Efficient System for Hazy Scene Text Detection using a Deep CNN and Patch-NMS (SM, TD, HPG), pp. 2588–2593.
ICPRICPR-2018-MohantyDG18a #network #robust
Robust Scene Text Detection with Deep Feature Pyramid Network and CNN based NMS Model (SM, TD, HPG), pp. 3741–3746.
ICPRICPR-2018-MoTWW #approach #performance
An Efficient Approach for Polyps Detection in Endoscopic Videos Based on Faster R-CNN (XM, KT, QW, GW), pp. 3929–3934.
ICPRICPR-2018-MustaniemiKSMH #metric #performance #using
Fast Motion Deblurring for Feature Detection and Matching Using Inertial Measurements (JM, JK, SS, JM, JH), pp. 3068–3073.
ICPRICPR-2018-NabilIMSQS #network #random
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters (MN, MI0, MMEAM, MS, KAQ, ES), pp. 740–745.
ICPRICPR-2018-NadeemHS #algorithm #automation #image #segmentation #using
An automated airway segmentation algorithm for CT images using topological leakage detection and volume freezing (SAN, EAH, PKS), pp. 1181–1186.
ICPRICPR-2018-PengLMSL #image #learning #sequence #video
Driving Maneuver Detection via Sequence Learning from Vehicle Signals and Video Images (XP, RL, YLM, SS, YL), pp. 1265–1270.
ICPRICPR-2018-PengSCCXJ #architecture #multi #using
Detecting Heads using Feature Refine Net and Cascaded Multi-scale Architecture (DP, ZS, ZC, ZC, LX, LJ), pp. 2528–2533.
ICPRICPR-2018-RaghavendraVRGB #multi #recognition
Detecting Disguise Attacks on Multi-spectral Face Recognition Through Spectral Signatures (RR, NV, KBR, RSG, CB), pp. 3371–3377.
ICPRICPR-2018-RazinkovSM #algorithm #named
ALFA: Agglomerative Late Fusion Algorithm for Object Detection (ER, IS, JM), pp. 2594–2599.
ICPRICPR-2018-ShengCWL #image #multi #ranking
Weakly Supervised Vehicle Detection in Satellite Images via Multiple Instance Ranking (YS, LC, CW0, JL), pp. 2765–2770.
ICPRICPR-2018-ShevchenkoEK
Fish Detection from Low Visibility Underwater Videos (VS, TE, AK), pp. 1971–1976.
ICPRICPR-2018-SongCHSC #refinement #semantics
Scene Text Detection via Deep Semantic Feature Fusion and Attention-based Refinement (YS, YC, HH, SS, XC), pp. 3747–3752.
ICPRICPR-2018-SuiZYC #framework #learning #novel #recognition
A Novel Integrated Framework for Learning both Text Detection and Recognition (WS, QZ, JY, WC), pp. 2233–2238.
ICPRICPR-2018-Sun0L #image #multimodal
Multimodal Face Spoofing Detection via RGB-D Images (XS0, LH0, CL), pp. 2221–2226.
ICPRICPR-2018-SunZWJ #behaviour #learning
Weak Supervised Learning Based Abnormal Behavior Detection (XS, SZ, SW, XYJ), pp. 1580–1585.
ICPRICPR-2018-TlustyAB #clustering #estimation
Unsupervised clustering of mammograms for outlier detection and breast density estimation (TT, GA, RBA), pp. 3808–3813.
ICPRICPR-2018-TuggenerESPS #classification #dataset #segmentation
DeepScores-A Dataset for Segmentation, Detection and Classification of Tiny Objects (LT, IE, JS, MP, TS), pp. 3704–3709.
ICPRICPR-2018-WangF #using
Saliency Detection using Iterative Dynamic Guided Filtering (CW, YF), pp. 3396–3401.
ICPRICPR-2018-WangLLL #multi #network
Anchor Free Network for Multi-Scale Face Detection (CW, ZL, SL, SL), pp. 1554–1559.
ICPRICPR-2018-WangWLW0 #identification
Temporal Action Detection by Joint Identification-Verification (WW, YW, HL, SW, JC0), pp. 2026–2031.
ICPRICPR-2018-WangXLTXX #multi #network
Multi-scale Fusion with Context-aware Network for Object Detection (HW, JX, LL, YT, DX, SX), pp. 2486–2491.
ICPRICPR-2018-WangXZ #encoding
Global Context Encoding for Salient Objects Detection (JW, YX, GZ), pp. 2337–2342.
ICPRICPR-2018-WangZGW #image #multi #network #parametricity #using
Fully convolutional neural networks for prostate cancer detection using multi-parametric magnetic resonance images: an initial investigation (YW, BZ, DG, JW), pp. 3814–3819.
ICPRICPR-2018-WangZL #generative #network
Anomaly Detection via Minimum Likelihood Generative Adversarial Networks (CW, YMZ, CLL), pp. 1121–1126.
ICPRICPR-2018-WuYWWX #recognition
Facial Expression Recognition for Different Pose Faces Based on Special Landmark Detection (WW, YY, YW, XW, DX), pp. 1524–1529.
ICPRICPR-2018-XieW #multi #segmentation #semantics
Multi-scale Semantic Segmentation Enriched Features for Pedestrian Detection (XX, ZW), pp. 2196–2201.
ICPRICPR-2018-XuD #modelling #using
Human Routine Change Detection using Bayesian Modelling (YX, DD), pp. 1833–1838.
ICPRICPR-2018-XuZH
Densely Connected Single-Shot Detector (PX, XZ, KH), pp. 2178–2183.
ICPRICPR-2018-Yang0CF #analysis #canonical #correlation #image #using
Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
ICPRICPR-2018-YangQKCF
Object Detection in Equirectangular Panorama (WY, YQ, JKK, FC, LF), pp. 2190–2195.
ICPRICPR-2018-YangQLZZLWS #estimation
A Light CNN based Method for Hand Detection and Orientation Estimation (LY, ZQ, ZL, SZ, YZ, HL0, JW, LS), pp. 2050–2055.
ICPRICPR-2018-YangZWQ #analysis #classification #image #quality #recognition
Quality Classified Image Analysis with Application to Face Detection and Recognition (FY, QZ0, MW, GQ), pp. 2863–2868.
ICPRICPR-2018-YanJY #3d #generative #network
3D Convolutional Generative Adversarial Networks for Detecting Temporal Irregularities in Videos (MY, XJ, JY), pp. 2522–2527.
ICPRICPR-2018-YanXAK #3d #fault #feature model
Accumulated Aggregation Shifting Based on Feature Enhancement for Defect Detection on 3D Textured Low-Contrast Surfaces (YY, SX, HA, SK), pp. 2965–2970.
ICPRICPR-2018-YaoDHB
Dense Receptive Field for Object Detection (YY, YD, ZH, HB), pp. 1815–1820.
ICPRICPR-2018-YinLLCS #multi #realtime
Cross Modal Multiscale Fusion Net for Real-time RGB-D Detection (KY, SL0, RL, YC, KS), pp. 2386–2391.
ICPRICPR-2018-YuanCLYL
Detecting Phishing Websites and Targets Based on URLs and Webpage Links (HY, XC0, YL, ZY, WL), pp. 3669–3674.
ICPRICPR-2018-YuLLW
A Fusion Strategy for the Single Shot Text Detector (ZY, SL, YL, PSPW), pp. 3687–3691.
ICPRICPR-2018-ZhangDKQL #multi #network
Global Contrast Enhancement Detection via Deep Multi-Path Network (CZ, DD, LK, HQ, SL), pp. 2815–2820.
ICPRICPR-2018-ZhangGX #automation #towards
Towards Automatic Detection of Monkey Faces (MZ, SG, XX), pp. 2564–2569.
ICPRICPR-2018-ZhangHLZ #network
Attention-based Neural Network for Traffic Sign Detection (JZ, LH, JL, YZ), pp. 1839–1844.
ICPRICPR-2018-ZhangWGWXL #effectiveness #learning #network
An Effective Deep Learning Based Scheme for Network Intrusion Detection (HZ, CQW, SG, ZW, YX, YL), pp. 682–687.
ICPRICPR-2018-ZhangYLQZC #network
Single Shot Feature Aggregation Network for Underwater Object Detection (LZ, XY0, ZL, LQ, HZ, CC), pp. 1906–1911.
ICPRICPR-2018-ZhangZZL #bound #image #performance
Boundary-based Image Forgery Detection by Fast Shallow CNN (ZZ, YZ, ZZ, JL), pp. 2658–2663.
ICPRICPR-2018-ZhengWXHG #adaptation #multi #self
A Noise-Robust Self-Adaptive Multitarget Speaker Detection System (SZ, JW, JX, WNH, JRG), pp. 1068–1072.
ICPRICPR-2018-ZhouKHSL
A Co-occurrence Background Model with Hypothesis on Degradation Modification for Object Detection in Strong Background Changes (WZ, SK, MH, YS, DL), pp. 1743–1748.
ICPRICPR-2018-ZhouMMB #learning
Learning Training Samples for Occlusion Edge Detection and Its Application in Depth Ordering Inference (YZ0, JM, AM, XB), pp. 541–546.
ICPRICPR-2018-ZhouYCK #image
Blurred Image Region Detection based on Stacked Auto-Encoder (YZ0, JY, YC, SYK), pp. 2959–2964.
ICPRICPR-2018-ZhuD #robust
Sliding Line Point Regression for Shape Robust Scene Text Detection (YZ, JD), pp. 3735–3740.
ICPRICPR-2018-ZhuZ #network
A Comprehensive Study on Upper-Body Detection with Deep Neural Networks (YZ, LZ), pp. 171–176.
ICPRICPR-2018-ZuninoMCAPBVBM #analysis #gesture #video
Video Gesture Analysis for Autism Spectrum Disorder Detection (AZ, PM, AC, CA, JP, FB, EV, CB, VM), pp. 3421–3426.
KDDKDD-2018-BorisyukGS #image #named #recognition #scalability
Rosetta: Large Scale System for Text Detection and Recognition in Images (FB, AG, VS), pp. 71–79.
KDDKDD-2018-ChungCHLE #behaviour #visual notation
Detection of Apathy in Alzheimer Patients by Analysing Visual Scanning Behaviour with RNNs (JC, SAC, NH, KLL, ME), pp. 149–157.
KDDKDD-2018-ConteMSGMV #community #named #network #scalability
D2K: Scalable Community Detection in Massive Networks via Small-Diameter k-Plexes (AC, TDM, DDS, RG, AM, LV), pp. 1272–1281.
KDDKDD-2018-EswaranFGM #graph #named #streaming
SpotLight: Detecting Anomalies in Streaming Graphs (DE, CF, SG, NM), pp. 1378–1386.
KDDKDD-2018-FanHZYA #exclamation
Gotcha - Sly Malware!: Scorpion A Metagraph2vec Based Malware Detection System (YF, SH, YZ, YY, MA), pp. 253–262.
KDDKDD-2018-He0LRLTZ #using
Detecting Vehicle Illegal Parking Events using Sharing Bikes' Trajectories (TH, JB0, RL, SR, YL, CT, YZ0), pp. 340–349.
KDDKDD-2018-HundmanCLCS #parametricity #using
Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding (KH, VC, CL, IC, TS), pp. 387–395.
KDDKDD-2018-LiuSZ
Where Will Dockless Shared Bikes be Stacked?: - Parking Hotspots Detection in a New City (ZL, YS, YZ), pp. 566–575.
KDDKDD-2018-LiuYH
Adversarial Detection with Model Interpretation (NL, HY, XH), pp. 1803–1811.
KDDKDD-2018-NaKY #data type #effectiveness #memory management #named #performance
DILOF: Effective and Memory Efficient Local Outlier Detection in Data Streams (GSN, DHK, HY), pp. 1993–2002.
KDDKDD-2018-PangCCL #learning #random
Learning Representations of Ultrahigh-dimensional Data for Random Distance-based Outlier Detection (GP, LC, LC, HL), pp. 2041–2050.
KDDKDD-2018-QahtanEFO0 #named #robust
FAHES: A Robust Disguised Missing Values Detector (AAQ, AKE, RCF, MO, NT0), pp. 2100–2109.
KDDKDD-2018-RouxPMVF #approach #machine learning #using
Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
KDDKDD-2018-SatoNHMHAM #learning
Managing Computer-Assisted Detection System Based on Transfer Learning with Negative Transfer Inhibition (IS, YN, SH, SM, NH, OA, YM), pp. 695–704.
KDDKDD-2018-ShashikumarSCN #bidirectional #network #using
Detection of Paroxysmal Atrial Fibrillation using Attention-based Bidirectional Recurrent Neural Networks (SPS, AJS, GDC, SN), pp. 715–723.
KDDKDD-2018-TaoXGLFZ #framework #game studies #named
NGUARD: A Game Bot Detection Framework for NetEase MMORPGs (JT, JX, LG, YL, CF, ZZ), pp. 811–820.
KDDKDD-2018-Valdez-VivasGKF #distributed #framework #performance #realtime
A Real-time Framework for Detecting Efficiency Regressions in a Globally Distributed Codebase (MVV, CG, AK, EF, KG, SC), pp. 821–829.
KDDKDD-2018-WangMJYXJSG #multi #named #network
EANN: Event Adversarial Neural Networks for Multi-Modal Fake News Detection (YW, FM, ZJ, YY0, GX, KJ, LS, JG0), pp. 849–857.
KDDKDD-2018-XieCS #online
False Discovery Rate Controlled Heterogeneous Treatment Effect Detection for Online Controlled Experiments (YX, NC, XS), pp. 876–885.
KDDKDD-2018-YuCAZCW #approach #flexibility #named #network
NetWalk: A Flexible Deep Embedding Approach for Anomaly Detection in Dynamic Networks (WY, WC, CCA, KZ0, HC, WW0), pp. 2672–2681.
ECMFAECMFA-2018-Ramadan0SRJ #modelling #process #requirements #security
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models (QR, DS, MS, VR, JJ), pp. 179–198.
ECOOPECOOP-2018-MezzettiMT #library #testing
Type Regression Testing to Detect Breaking Changes in Node.js Libraries (GM, AM, MTT), p. 24.
OOPSLAOOPSLA-2018-BlackshearGOS #composition #concurrent #named
RacerD: compositional static race detection (SB, NG, PWO, IS), p. 28.
OOPSLAOOPSLA-2018-MathurK0 #concurrent #power of #predict #what
What happens-after the first race? enhancing the predictive power of happens-before based dynamic race detection (UM, DK, MV0), p. 29.
OOPSLAOOPSLA-2018-PradelS #approach #debugging #learning #named
DeepBugs: a learning approach to name-based bug detection (MP, KS), p. 25.
PADLPADL-2018-AnandCN #automation #consistency #logic #nondeterminism #using
An Automated Detection of Inconsistencies in SBVR-based Business Rules Using Many-sorted Logic (KA, PKC, RN), pp. 80–96.
PLDIPLDI-2018-DuckY #c #c++ #effectiveness #fault #memory management #named #using
EffectiveSan: type and memory error detection using dynamically typed C/C++ (GJD, RHCY), pp. 181–195.
PLDIPLDI-2018-PengGD #named
CURD: a dynamic CUDA race detector (YP, VG, JD), pp. 390–403.
PLDIPLDI-2018-RoemerGB #bound #concurrent #predict
High-coverage, unbounded sound predictive race detection (JR, KG, MDB), pp. 374–389.
POPLPOPL-2018-GrossmanAGMRSZ #contract #effectiveness #online
Online detection of effectively callback free objects with applications to smart contracts (SG, IA, GGG, YM, NR, MS, YZ), p. 28.
ASEASE-2018-HabibP18a #case study #debugging #how
How many of all bugs do we find? a study of static bug detectors (AH, MP), pp. 317–328.
ASEASE-2018-He0WZLX #android #comprehension
Understanding and detecting evolution-induced compatibility issues in Android apps (DH, LL0, LW, HZ, GL, JX), pp. 167–177.
ASEASE-2018-HuangWLC #android #comprehension
Understanding and detecting callback compatibility issues for Android applications (HH, LW, YL, SCC), pp. 532–542.
ASEASE-2018-JiangLC #contract #fuzzing #named
ContractFuzzer: fuzzing smart contracts for vulnerability detection (BJ, YL, WKC), pp. 259–269.
ASEASE-2018-LiuHZLLPZ #named #similarity
αDiff: cross-version binary code similarity detection with DNN (BL, WH, CZ0, WL, FL, AP, WZ), pp. 667–678.
ASEASE-2018-LiuXZ #learning
Deep learning based feature envy detection (HL, ZX, YZ), pp. 385–396.
ASEASE-2018-MoranWHPP #evolution #mobile #user interface
Detecting and summarizing GUI changes in evolving mobile apps (KM, CW, JH, GP, DP), pp. 543–553.
ASEASE-2018-Vera-PerezMB #named #pseudo #tool support
Descartes: a PITest engine to detect pseudo-tested methods: tool demonstration (OLVP, MM, BB), pp. 908–911.
ESEC-FSEESEC-FSE-2018-0006WR #android #energy
Detection of energy inefficiencies in Android wear watch faces (HZ0, HW, AR), pp. 691–702.
ESEC-FSEESEC-FSE-2018-AdamsenMAT #ajax #concurrent #javascript #web
Practical AJAX race detection for JavaScript web applications (CQA, AM, SA, FT), pp. 38–48.
ESEC-FSEESEC-FSE-2018-BianLSH0 #debugging #named
NAR-miner: discovering negative association rules from code for bug detection (PB, BL0, WS, JH0, YC0), pp. 411–422.
ESEC-FSEESEC-FSE-2018-DongWLGBLXK #android #automation #named
FraudDroid: automated ad fraud detection for Android apps (FD, HW, LL0, YG0, TFB, TL, GX, JK), pp. 257–268.
ESEC-FSEESEC-FSE-2018-GadelhaMCN #debugging #performance #towards
Towards counterexample-guided k-induction for fast bug detection (MYRG, FRM, LCC, DAN), pp. 765–769.
ESEC-FSEESEC-FSE-2018-GuoWW #execution #symbolic computation
Adversarial symbolic execution for detecting concurrency-related cache timing leaks (SG, MW, CW0), pp. 377–388.
ESEC-FSEESEC-FSE-2018-KateOZEX #consistency #named #nondeterminism #physics #probability
Phys: probabilistic physical unit assignment and inconsistency detection (SK, JPO, XZ, SGE, ZX), pp. 563–573.
ESEC-FSEESEC-FSE-2018-KiniM0 #concurrent
Data race detection on compressed traces (DK, UM, MV0), pp. 26–37.
ESEC-FSEESEC-FSE-2018-LiuYLJZS #clone detection #named #semantics #sketching #transaction
EClone: detect semantic clones in Ethereum via symbolic transaction sketch (HL, ZY, CL, YJ0, WZ, JS), pp. 900–903.
ESEC-FSEESEC-FSE-2018-SainiFLBL #named
Oreo: detection of clones in the twilight zone (VS, FF, YL, PB, CVL), pp. 354–365.
ESEC-FSEESEC-FSE-2018-WoodRAM #debugging #developer #speech
Detecting speech act types in developer question/answer conversations during bug repair (AW, PR, AA, CM), pp. 491–502.
ESEC-FSEESEC-FSE-2018-YangYSLC #automation #ide #named #web
PowerStation: automatically detecting and fixing inefficiencies of database-backed web applications in IDE (JY, CY, PS, SL, AC), pp. 884–887.
ICSE-2018-BellLHEYM #automation #named #testing
DeFlaker: automatically detecting flaky tests (JB0, OL, MH, LE, TY, DM), pp. 433–444.
ICSE-2018-CalefatoLMN #development #sentiment
Sentiment polarity detection for software development (FC, FL, FM, NN), p. 128.
ICSE-2018-GarciaHM #android #identification #lightweight #obfuscation #product line
Lightweight, obfuscation-resilient detection and family identification of Android malware (JG, MH, SM), p. 497.
ICSE-2018-PapadakisSYB #correlation #empirical #fault #scalability
Are mutation scores correlated with real fault detection?: a large scale empirical study on the relationship between mutants and real faults (MP, DS0, SY, DHB), pp. 537–548.
ICSE-2018-ShanNS #android #behaviour #self
Self-hiding behavior in Android apps: detection and characterization (ZS, IN, RS), pp. 728–739.
ICSE-2018-TsantalisMEMD #commit #performance #refactoring
Accurate and efficient refactoring detection in commit history (NT, MM, LME, DM, DD), pp. 483–494.
ICSE-2018-WangSWXR #clone detection #named
CCAligner: a token based large-gap clone detector (PW, JS, YW, YX, CKR), pp. 1066–1077.
ICSE-2018-YanSCX #approach #reduction
Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities (HY, YS, SC0, JX), pp. 327–337.
GPCEGPCE-2018-VolanschiSC #domain-specific language #implementation
Implementing a semi-causal domain-specific language for context detection over binary sensors (NV, BPS, CC), pp. 66–78.
ASPLOSASPLOS-2018-DavidPY #named #precise #static analysis
FirmUp: Precise Static Detection of Common Vulnerabilities in Firmware (YD, NP, EY), pp. 392–404.
ASPLOSASPLOS-2018-HuN #android #static analysis
Static Detection of Event-based Races in Android Apps (YH, IN), pp. 257–270.
ASPLOSASPLOS-2018-LiuWLLYT #automation #debugging #named
FCatch: Automatically Detecting Time-of-fault Bugs in Cloud Systems (HL, XW, GL, SL, FY, CT0), pp. 419–431.
CASECASE-2018-AhmedDB0 #generative
Outlier Detection for Hydropower Generation Plant (IA, AD, AB, YD0), pp. 193–198.
CASECASE-2018-AshouriHNS #approximate #energy #performance #using
Energy Performance Based Anomaly Detection in Non-Residential Buildings Using Symbolic Aggregate Approximation (AA, YH, GRN, WS0), pp. 1400–1405.
CASECASE-2018-DasWSP #adaptation #interactive #using
Whole Body Human-Robot Collision Detection Using Base-sensor Neuroadaptive Interaction (SKD, IW, MNS, DOP), pp. 278–283.
CASECASE-2018-ElHadyP #correlation #towards
Towards Sensor Failure Detection in Ambient Assisted Living: Sensors Correlations (NEE, JP), pp. 378–383.
CASECASE-2018-GaoXDCSG #using
Detection of Weld Cracks Using Magneto-optical Imaging (XG, YX, LD, ZC, YS, PPG), pp. 559–564.
CASECASE-2018-GohSHSS #automation #clustering
Semi-Automatic Snore Detection in Polysomnography based on Hierarchical Clustering (CFG, LBS, MHH, GLGS, KS), pp. 1116–1122.
CASECASE-2018-GonzalezCPS #interface #multi
Obstacle Detection and Avoidance Device for Multirotor UAVs through interface with Pixhawk Flight Controller (JG, AC, JAP, CS), pp. 110–115.
CASECASE-2018-GuptaKKN
Vision-based deformation and wrinkle detection for semi-finished fiber products on curved surfaces (KG, MK, FK, HN), pp. 618–623.
CASECASE-2018-HaghighiRATMC #using
Depth-based Object Detection using Hierarchical Fragment Matching Method (RH, MR, SMA, KPT, AAM0, CMC), pp. 780–785.
CASECASE-2018-JalalianLWAC #approach #automation #fault #statistics #visual notation
An Automatic Visual Inspection Method based on Statistical Approach for Defect Detection of Ship Hull Surfaces (AJ, WFL, FSW, SMA, CMC), pp. 445–450.
CASECASE-2018-SeichterESG #how #learning
How to Improve Deep Learning based Pavement Distress Detection while Minimizing Human Effort (DS, ME0, RS, HMG), pp. 63–70.
CASECASE-2018-WangKZY #concept #data type #learning #multi
A Multiscale Concept Drift Detection Method for Learning from Data Streams (XW, QK, MZ, SY), pp. 786–790.
CASECASE-2018-Wu #approach #automation #clustering #multi #online
CASE 2018 Special Session Presentation-Only Abstract Submission Form: A Sequential Bayesian Partitioning Approach for Online Steady State Detection of Multivariate Systems (JW), pp. 1308–1309.
CASECASE-2018-ZhangM #data-driven
Data-driven Downtime Bottleneck Detection in Open Flow Lines (MZ, AM), pp. 1513–1518.
CASECASE-2018-ZhangZY #algorithm #distributed #fault
A Distributed Algorithm for Sensor Fault Detection (ZZ, QZ, WY), pp. 756–761.
CGOCGO-2018-0001LQDL #android #distributed #logic #using
Resilient decentralized Android application repackaging detection using logic bombs (QZ0, LL, ZQ, XD, ZL), pp. 50–61.
CGOCGO-2018-FuLJ #android #named
nAdroid: statically detecting ordering violations in Android applications (XF, DL, CJ), pp. 62–74.
CGOCGO-2018-RoySKL #lightweight
Lightweight detection of cache conflicts (PR, SLS, SK, XL0), pp. 200–213.
FASEFASE-2018-KorogluS #android #named #testing
TCM: Test Case Mutation to Improve Crash Detection in Android (YK, AS0), pp. 264–280.
ICSTICST-2018-GambiBZ #dependence
Practical Test Dependency Detection (AG, JB0, AZ), pp. 1–11.
ICSTICST-2018-RyouR #automation #fault #html #layout #web
Automatic Detection of Visibility Faults by Layout Changes in HTML5 Web Pages (YR, SR), pp. 182–192.
ICSTICST-2018-TimperleyAKHG #debugging #question #simulation
Crashing Simulated Planes is Cheap: Can Simulation Detect Robotics Bugs Early? (CST, AA, DSK, JMH, CLG), pp. 331–342.
TAPTAP-2018-VorobyovKS #c #case study #experience #runtime #security #using #verification
Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report (KV, NK, JS), pp. 139–156.
CSEETCSEET-2017-JoL #case study #education #keyword #re-engineering #video #word
A Study of Keywords Based on the Word Frequency Effect Theory in Video Lectures of Software Engineering Education for Detecting Mind (JJ, HL), pp. 241–245.
EDMEDM-2017-HuttHBSRD
Gaze-based Detection of Mind Wandering during Lecture Viewing (SH, JH, RB, AS, EFR, SD).
EDMEDM-2017-PatikornSHBZ #multi #using
Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects (TP, DS, NTH, JB, JZ).
EDMEDM-2017-StewartBD
Generalizability of Face-Based Mind Wandering Detection Across Task Contexts (AS, NB, SD).
EDMEDM-2017-TatoND #automation #network #reasoning
Convolutional Neural Network for Automatic Detection of Sociomoral Reasoning Level (AANT, RN, AD).
EDMEDM-2017-YinBPHZ #empirical #personalisation
Causal Forest vs. Naive Causal Forest in Detecting Personalization: An Empirical Study in ASSISTments (BY, AFB, TP, NTH, JZ).
EDMEDM-2017-ZengCB #online
Learner Affect Through the Looking Glass: Characterization and Detection of Confusion in Online Courses (ZZ, SC, SB).
ICPCICPC-2017-HozanoGAFC #developer #exclamation #performance #smell
Smells are sensitive to developers!: on the efficiency of (un)guided customized detection (MH, AG, NA, BF, EdBC), pp. 110–120.
ICPCICPC-2017-HuZLG #architecture #clone detection #compilation
Binary code clone detection across architectures and compiling configurations (YH, YZ0, JL, DG), pp. 88–98.
ICPCICPC-2017-LiPG #automation
Automatically detecting integrity violations in database-centric applications (BL, DP, MG), pp. 251–262.
ICPCICPC-2017-NguyenJQ #android #mining #repository
Android repository mining for detecting publicly accessible functions missing permission checks (HHN, LJ, TTQ), pp. 324–327.
ICPCICPC-2017-SousaSFFB #composition #flexibility #named #smell
FindSmells: flexible composition of bad smell detection strategies (BLS, PPS, EF, KAMF, MASB), pp. 360–363.
ICPCICPC-2017-YueFM0TXL #android #automation #named
RepDroid: an automated tool for Android application repackaging detection (SY, WF, JM0, YJ0, XT, CX0, JL0), pp. 132–142.
ICSMEICSME-2017-EbertCNS #code review
Confusion Detection in Code Reviews (FE, FC, NN, AS), pp. 549–553.
ICSMEICSME-2017-GuoWXL #adaptation #consistency #named #nondeterminism #scheduling
GEAS: Generic Adaptive Scheduling for High-Efficiency Context Inconsistency Detection (BG, HW, CX0, JL0), pp. 137–147.
ICSMEICSME-2017-LiFZMR #approach #clone detection #named
CCLearner: A Deep Learning-Based Clone Detection Approach (LL, HF, WZ, NM, BGR), pp. 249–260.
ICSMEICSME-2017-PanM
Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions (JP, XM), pp. 24–34.
MSRMSR-2017-SilvaV #named #refactoring #version control
RefDiff: detecting refactorings in version histories (DS, MTV), pp. 269–279.
SANERSANER-2017-Kirda #approach #automation #named #scalability
UNVEIL: A large-scale, automated approach to detecting ransomware (keynote) (EK), p. 1.
SANERSANER-2017-MizobuchiT #stack overflow
Two improvements to detect duplicates in Stack Overflow (YM, KT), pp. 563–564.
SANERSANER-2017-PalombaNPZL #lightweight #smell
Lightweight detection of Android-specific code smells: The aDoctor project (FP, DDN, AP, AZ, ADL), pp. 487–491.
SANERSANER-2017-ZhangLKXLS #git #repository
Detecting similar repositories on GitHub (YZ0, DL0, PSK, XX0, QL, JS), pp. 13–23.
SCAMSCAM-2017-NagyC #embedded #java #query #smell #sql
A Static Code Smell Detector for SQL Queries Embedded in Java Code (CN0, AC), pp. 147–152.
SCAMSCAM-2017-NashaatAM #object-oriented #php #security #source code
Detecting Security Vulnerabilities in Object-Oriented PHP Programs (MN, KA0, JM0), pp. 159–164.
SCAMSCAM-2017-RuizCM #source code
Working Around Loops for Infeasible Path Detection in Binary Programs (JR, HC, MDM), pp. 1–10.
CoGCIG-2017-BurnsT #game studies #using
Detecting flow in games using facial expressions (AB, JRT), pp. 45–52.
CoGVS-Games-2017-MaltezosDI #3d #modelling #visualisation
Improving the visualisation of 3D textured models via shadow detection and removal (EM, AD, CI), pp. 161–164.
CIKMCIKM-2017-CaiLZ #behaviour #modelling #social
Detecting Social Bots by Jointly Modeling Deep Behavior and Content Information (CC, LL, DZ), pp. 1995–1998.
CIKMCIKM-2017-CavallariZCCC #community #graph #learning
Learning Community Embedding with Community Detection and Node Embedding on Graphs (SC, VWZ, HC, KCCC, EC), pp. 377–386.
CIKMCIKM-2017-ChenDWXCCM #learning #spreadsheet
Spreadsheet Property Detection With Rule-assisted Active Learning (ZC, SD, RW, GX, DC, MJC, JDM), pp. 999–1008.
CIKMCIKM-2017-FanZYLZ #automation #case study #social #social media #twitter
Social Media for Opioid Addiction Epidemiology: Automatic Detection of Opioid Addicts from Twitter and Case Studies (YF, YZ, YY, XL, WZ), pp. 1259–1267.
CIKMCIKM-2017-HagenPAFS #retrieval #reuse
Source Retrieval for Web-Scale Text Reuse Detection (MH, MP, PA, EF, BS0), pp. 2091–2094.
CIKMCIKM-2017-KhandpurJJ0LR #crowdsourcing #social #social media #using
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media (RPK, TJ, STKJ, GW0, CTL, NR), pp. 1049–1057.
CIKMCIKM-2017-LiCHCGPY
Public Transportation Mode Detection from Cellular Data (GL, CJC, SYH, AJC, XG, WCP, CWY), pp. 2499–2502.
CIKMCIKM-2017-LiHPG #framework #machine learning #named
DeMalC: A Feature-rich Machine Learning Framework for Malicious Call Detection (YL, DH, AP, ZG), pp. 1559–1567.
CIKMCIKM-2017-LiuHF #named
HoloScope: Topology-and-Spike Aware Fraud Detection (SL, BH, CF), pp. 1539–1548.
CIKMCIKM-2017-MengMJ
Hierarchical RNN with Static Sentence-Level Attention for Text-Based Speaker Change Detection (ZM, LM, ZJ), pp. 2203–2206.
CIKMCIKM-2017-MeuschkeSHSG
Analyzing Mathematical Content to Detect Academic Plagiarism (NM, MS, FH, TS, BG), pp. 2211–2214.
CIKMCIKM-2017-Mihalcea
Deception Detection: When Computers Become Better than Humans (RM), p. 3.
CIKMCIKM-2017-PangXCZ #category theory #learning
Selective Value Coupling Learning for Detecting Outliers in High-Dimensional Categorical Data (GP, HX, LC, WZ), pp. 807–816.
CIKMCIKM-2017-PatwariGB #classification #multi #named
TATHYA: A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates (AP, DG, SB), pp. 2259–2262.
CIKMCIKM-2017-PersiaBH #framework #interactive #modelling #video
An Interactive Framework for Video Surveillance Event Detection and Modeling (FP, FB, SH), pp. 2515–2518.
CIKMCIKM-2017-ProskurniaM0AC #documentation #performance #topic #using
Efficient Document Filtering Using Vector Space Topic Expansion and Pattern-Mining: The Case of Event Detection in Microposts (JP, RM, CC0, KA, PCM), pp. 457–466.
CIKMCIKM-2017-RuchanskySL #hybrid #named
CSI: A Hybrid Deep Model for Fake News Detection (NR, SS, YL0), pp. 797–806.
CIKMCIKM-2017-SunSGOC #approach #community #symmetry
A Non-negative Symmetric Encoder-Decoder Approach for Community Detection (BJS, HS, JG, WO, XC), pp. 597–606.
CIKMCIKM-2017-TengLW #learning #multi #network #using
Anomaly Detection in Dynamic Networks using Multi-view Time-Series Hypersphere Learning (XT, YRL, XW), pp. 827–836.
CIKMCIKM-2017-WilliamsZ #interactive #modelling #sequence
Does That Mean You're Happy?: RNN-based Modeling of User Interaction Sequences to Detect Good Abandonment (KW, IZ), pp. 727–736.
CIKMCIKM-2017-WuSZ #approach #behaviour #modelling #performance
A Fast Trajectory Outlier Detection Approach via Driving Behavior Modeling (HW0, WS, BZ), pp. 837–846.
CIKMCIKM-2017-WuUBG #network
Conflict of Interest Declaration and Detection System in Heterogeneous Networks (SW, LHU, SSB, WG), pp. 2383–2386.
CIKMCIKM-2017-YuanSCZG0 #multi #sequence
Detecting Multiple Periods and Periodic Patterns in Event Time Sequences (QY0, JS, XC, CZ0, XG, JH0), pp. 617–626.
CIKMCIKM-2017-YuanWLL #network
Spectrum-based Deep Neural Networks for Fraud Detection (SY, XW, JL, AL), pp. 2419–2422.
CIKMCIKM-2017-ZhangCYL #community #enterprise #learning #named
BL-ECD: Broad Learning based Enterprise Community Detection via Hierarchical Structure Fusion (JZ, LC, PSY, YL), pp. 859–868.
CIKMCIKM-2017-ZhuAMZH
Outlier Detection in Sparse Data with Factorization Machines (MZ, CCA, SM0, HZ, JH), pp. 817–826.
ECIRECIR-2017-AlviSC #obfuscation
Plagiarism Detection in Texts Obfuscated with Homoglyphs (FA, MS, PDC), pp. 669–675.
ECIRECIR-2017-Anand0P #exclamation #network #what
We Used Neural Networks to Detect Clickbaits: You Won't Believe What Happened Next! (AA, TC0, NP), pp. 541–547.
ECIRECIR-2017-GarbaceaK #analysis #summary
A Systematic Analysis of Sentence Update Detection for Temporal Summarization (CG, EK), pp. 424–436.
ECIRECIR-2017-HuangHC #network
Irony Detection with Attentive Recurrent Neural Networks (YHH, HHH, HHC), pp. 534–540.
ECIRECIR-2017-QinWLT
Counteracting Novelty Decay in First Story Detection (YQ, DW, VL, CT), pp. 555–560.
ICMLICML-2017-AksoylarOS
Connected Subgraph Detection with Mirror Descent on SDPs (CA, LO, VS), pp. 51–59.
ICMLICML-2017-FutomaHH #classification #learning #multi #process
Learning to Detect Sepsis with a Multitask Gaussian Process RNN Classifier (JF, SH, KAH), pp. 1174–1182.
ICMLICML-2017-HonerNBMG #robust #trust
Minimizing Trust Leaks for Robust Sybil Detection (JH, SN, AB0, KRM, NG), pp. 1520–1528.
KDDKDD-2017-CaoZZYPZARL #mobile #modelling #named #type system
DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection (BC, LZ, CZ, PSY, AP, JZ, OA, KR, ADL), pp. 747–755.
KDDKDD-2017-DadkhahiM #embedded #learning #network
Learning Tree-Structured Detection Cascades for Heterogeneous Networks of Embedded Devices (HD, BMM), pp. 1773–1781.
KDDKDD-2017-FuA0TX #automation #interactive #named
REMIX: Automated Exploration for Interactive Outlier Detection (YF, CCA, SP0, DST, HX), pp. 827–835.
KDDKDD-2017-HassanALT #automation #towards
Toward Automated Fact-Checking: Detecting Check-worthy Factual Claims by ClaimBuster (NH, FA, CL, MT), pp. 1803–1812.
KDDKDD-2017-HouYSA #android #named #network
HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network (SH, YY, YS, MA), pp. 1507–1515.
KDDKDD-2017-MaurusP #using
Let's See Your Digits: Anomalous-State Detection using Benford's Law (SM, CP), pp. 977–986.
KDDKDD-2017-SaveskiPSDGXA #network #random
Detecting Network Effects: Randomizing Over Randomized Experiments (MS, JPA, GSJ, WD, SG, YX, EMA), pp. 1027–1035.
KDDKDD-2017-ShinHKF #incremental #named
DenseAlert: Incremental Dense-Subtensor Detection in Tensor Streams (KS, BH, JK, CF), pp. 1057–1066.
KDDKDD-2017-SifferFTL
Anomaly Detection in Streams with Extreme Value Theory (AS, PAF, AT, CL), pp. 1067–1075.
KDDKDD-2017-WangFLHA #process
Human Mobility Synchronization and Trip Purpose Detection with Mixture of Hawkes Processes (PW, YF, GL, WH, CCA), pp. 495–503.
KDDKDD-2017-WangGZOXLG #network
Adversary Resistant Deep Neural Networks with an Application to Malware Detection (QW, WG, KZ, AGOI, XX, XL, CLG), pp. 1145–1153.
KDDKDD-2017-WuAL
Structural Event Detection from Log Messages (FW0, PA, ZL), pp. 1175–1184.
KDDKDD-2017-YanCKR #big data #distributed
Distributed Local Outlier Detection in Big Data (YY, LC, CK, EAR), pp. 1225–1234.
KDDKDD-2017-YanCR #scalability
Scalable Top-n Local Outlier Detection (YY, LC, EAR), pp. 1235–1244.
KDDKDD-2017-ZhangLLYZH0 #named #online #twitter
TrioVecEvent: Embedding-Based Online Local Event Detection in Geo-Tagged Tweet Streams (CZ0, LL, DL, QY0, HZ, TH, JH0), pp. 595–604.
KDDKDD-2017-ZhengBLL #learning #metric
Contextual Spatial Outlier Detection with Metric Learning (GZ, SLB, TL, ZL), pp. 2161–2170.
KDDKDD-2017-ZhouP #robust
Anomaly Detection with Robust Deep Autoencoders (CZ, RCP), pp. 665–674.
ECOOPECOOP-2017-HuangR #concurrent #performance #perspective #precise #what
What's the Optimal Performance of Precise Dynamic Race Detection? - A Redundancy Perspective (JH, AKR), p. 22.
OOPSLAOOPSLA-2017-AdamsenMT #concurrent #javascript #web
Practical initialization race detection for JavaScript web applications (CQA, AM, FT), p. 22.
OOPSLAOOPSLA-2017-RiceAJJPA #fault
Detecting argument selection defects (AR, EA, CJ, EJ, MP, YAP), p. 22.
OOPSLAOOPSLA-2017-WoodCBG #bias #concurrent
Instrumentation bias for dynamic data race detection (BPW, MC, MDB, DG), p. 31.
LOPSTRLOPSTR-2017-AlbertGI #concurrent #effectiveness #generative
Generation of Initial Contexts for Effective Deadlock Detection (EA, MGZ, MI), pp. 3–19.
LOPSTRLOPSTR-2017-LaneveG #bytecode #concurrent #java
Deadlock Detection of Java Bytecode (CL, AG), pp. 37–53.
PEPMPEPM-2017-MatsushitaS
Detecting code clones with gaps by function applications (TM, IS), pp. 12–22.
PLDIPLDI-2017-RhodesFF #concurrent #named #static analysis
BigFoot: static check placement for dynamic race detection (DR, CF, SNF), pp. 141–156.
PLDIPLDI-2017-SanthiarK #c# #concurrent #source code
Static deadlock detection for asynchronous C# programs (AS, AK), pp. 292–305.
POPLPOPL-2017-LidburyD #concurrent
Dynamic race detection for C++11 (CL, AFD), pp. 443–457.
ASEASE-2017-ChenODL #static analysis #web
Static detection of asymptotic resource side-channel vulnerabilities in web applications (JC, OO, ID, CL), pp. 229–239.
ASEASE-2017-FazziniO #automation #consistency #mobile #nondeterminism #platform
Automated cross-platform inconsistency detection for mobile apps (MF, AO), pp. 308–318.
ASEASE-2017-LeeHR #all about #injection #process #semantics
All about activity injection: threats, semantics, and detection (SL, SH, SR), pp. 252–262.
ASEASE-2017-LeeYSNM #android #named #security #visualisation
SEALANT: a detection and visualization tool for inter-app security vulnerabilities in Android (YKL, PY, AS, DN, NM), pp. 883–888.
ASEASE-2017-MathisASBZ #data flow
Detecting information flow by mutating input data (BM, VA, EOS, MB, AZ), pp. 263–273.
ASEASE-2017-OcarizaP0 #consistency #nondeterminism #web
Detecting unknown inconsistencies in web applications (FSOJ, KP, AM0), pp. 566–577.
ASEASE-2017-RatolR
Detecting fragile comments (IKR, MPR), pp. 112–122.
ASEASE-2017-ZhouSLCL #named
UNDEAD: detecting and preventing deadlocks in production software (JZ, SS, HL, YC0, TL), pp. 729–740.
ESEC-FSEESEC-FSE-2017-AliabadiKGP #cyber-physical #invariant #named #security
ARTINALI: dynamic invariant detection for cyber-physical system security (MRA, AAK, JGS, KP), pp. 349–361.
ESEC-FSEESEC-FSE-2017-ChaparroLZMPMBN #debugging
Detecting missing information in bug descriptions (OC, JL, FZ, LM, MDP, AM, GB, VN), pp. 396–407.
ESEC-FSEESEC-FSE-2017-GuoCY #concurrent #execution #named #thread
AtexRace: across thread and execution sampling for in-house race detection (YG, YC0, ZY), pp. 315–325.
ESEC-FSEESEC-FSE-2017-Mujahid #android #case study #smarttech
Detecting wearable app permission mismatches: a case study on Android wear (SM), pp. 1065–1067.
ESEC-FSEESEC-FSE-2017-PastoreM #automation #fault #named
VART: a tool for the automatic detection of regression faults (FP, LM), pp. 964–968.
ICSE-2017-ChenJ #anti
Characterizing and detecting anti-patterns in the logging code (BC, ZM(J), pp. 71–81.
ICSE-2017-ChoudharyLP #concurrent #generative #performance #safety #testing #thread
Efficient detection of thread safety violations via coverage-guided generation of concurrent tests (AC, SL, MP), pp. 266–277.
ICSE-2017-GaoBB #debugging #javascript
To type or not to type: quantifying detectable bugs in JavaScript (ZG, CB, ETB), pp. 758–769.
ICSE-2017-HawkinsD #named #php
ZenIDS: introspective intrusion detection for PHP applications (BH, BD), pp. 232–243.
ICSE-2017-LiWWWWLXH #android #library #named #precise #scalability
LibD: scalable and precise third-party library detection in android markets (ML, WW, PW0, SW0, DW, JL, RX, WH), pp. 335–346.
ICSE-2017-PadhyeS #dynamic analysis #named #traversal
Travioli: a dynamic analysis for detecting data-structure traversals (RP, KS), pp. 473–483.
ICSE-2017-RodegheroJAM #developer #summary
Detecting user story information in developer-client conversations to generate extractive summaries (PR, SJ, AA, CM), pp. 49–59.
ICSE-2017-ThomeSBB #constraints #string #theorem proving
Search-driven string constraint solving for vulnerability detection (JT, LKS, DB, LCB), pp. 198–208.
ICSE-2017-VendomeVBPGP #exception #machine learning #open source
Machine learning-based detection of open source license exceptions (CV, MLV, GB, MDP, DMG, DP), pp. 118–129.
ICSE-2017-ZhouGCHPG #api #documentation #fault
Analyzing APIs documentation and code to detect directive defects (YZ0, RG, TC, ZH, SP, HCG), pp. 27–37.
ASPLOSASPLOS-2017-LiuLLLLGT #automation #concurrent #debugging #distributed #named
DCatch: Automatically Detecting Distributed Concurrency Bugs in Cloud Systems (HL, GL, JFL, JL, SL, HSG, CT0), pp. 677–691.
ASPLOSASPLOS-2017-ZhangJL #concurrent #named
ProRace: Practical Data Race Detection for Production Use (TZ, CJ, DL), pp. 149–162.
CASECASE-2017-ChenWWWC #big data #classification #fault #multi
Big data analytic for multivariate fault detection and classification in semiconductor manufacturing (YJC, BCW, JZW, YCW, CFC), pp. 731–736.
CASECASE-2017-ChenZ #automation #multi #using
An automatic seizure detection method using multi-channel EEG signals (SC, XZ0), pp. 94–95.
CASECASE-2017-HanCZ #approach #matrix
Matrix approach to detectability of discrete event systems under partial observation (XH, ZC, JZ), pp. 187–192.
CASECASE-2017-JiaSYCYG #big data #data analysis #multi
Big-data analysis of multi-source logs for anomaly detection on network-based system (ZJ, CS0, XY, YC, TY, XG), pp. 1136–1141.
CASECASE-2017-KimV #adaptation #fault
Quadruple adaptive redundancy with fault detection estimator (DK, RMV), pp. 542–547.
CASECASE-2017-LuanWZCZ #fault #process
Porosity defect detection based on FastICA-RBF during pulsed TIG welding process (RL, GW, RZ, ZC, ZZ), pp. 548–553.
CASECASE-2017-LuLAHH
Generalized Haar filter based CNN for object detection in traffic scenes (KL, JL, XA, HH, XH0), pp. 1657–1662.
CASECASE-2017-LuRSW #learning #visual notation
Visual guided deep learning scheme for fall detection (NL, XR, JS, YW), pp. 801–806.
CASECASE-2017-RonB #clustering
Density based clustering for detection of robotic operations (MR, PB), pp. 314–319.
CASECASE-2017-SaezMBT #analysis #cyber-physical
Anomaly detection and productivity analysis for cyber-physical systems in manufacturing (MS, FPM, KB, DMT), pp. 23–29.
CASECASE-2017-TanGCCT #automation
Automated vision based detection of blistering on metal surface: For robot (WCT, PCG, AC, IMC, HKT), pp. 74–79.
CASECASE-2017-ZhaoSY
Obstacle detection and avoidance for autonomous bicycles (MZ, SS, YY), pp. 1310–1315.
CASECASE-2017-ZouZ #analysis
Occupancy detection in elevator car by fusing analysis of dual videos (JZ, QZ), pp. 906–911.
CCCC-2017-BiswasCZBW #concurrent #lightweight
Lightweight data race detection for production runs (SB, MC, MZ, MDB, BPW), pp. 11–21.
CGOCGO-2017-ErbCG
Dynamic buffer overflow detection for GPGPUs (CE, MC, JLG), pp. 61–73.
CGOCGO-2017-JimboreanWEKR #automation
Automatic detection of extended data-race-free regions (AJ, JW, PE, SK, AR), pp. 14–26.
CADECADE-2017-0001SUP #consistency #first-order #knowledge base #nondeterminism #scalability
Detecting Inconsistencies in Large First-Order Knowledge Bases (SS0, GS, JU, AP), pp. 310–325.
CAVCAV-2017-AlurDLS #gpu #named #source code
GPUDrano: Detecting Uncoalesced Accesses in GPU Programs (RA, JD, OSNL, NS), pp. 507–525.
CAVCAV-2017-SinghBM #debugging #fault #formal method #locality #named #validation
E-QED: Electrical Bug Localization During Post-silicon Validation Enabled by Quick Error Detection and Formal Methods (ES, CWB, SM), pp. 104–125.
ICSTICST-2017-Gay #fault #generative #search-based #testing
The Fitness Function for the Job: Search-Based Generation of Test Suites That Detect Real Faults (GG), pp. 345–355.
ICSTICST-2017-TangCZGXHBM #android #automation #named #verification
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps (JT, XC, ZZ0, SG, XSX, CH, TB, BM), pp. 492–499.
VMCAIVMCAI-2017-CuoqRC #alias #strict
Detecting Strict Aliasing Violations in the Wild (PC, LR, AC), pp. 14–33.
VMCAIVMCAI-2017-MukherjeeKD #kernel
Detecting All High-Level Dataraces in an RTOS Kernel (SM, AK, DD), pp. 405–423.
ECSAECSA-2016-KaptoEKT #analysis #approach #architecture #evolution #source code
Inferring Architectural Evolution from Source Code Analysis - A Tool-Supported Approach for the Detection of Architectural Tactics (CK, GEB, SK, CT), pp. 149–165.
WICSAWICSA-2016-FontanaRZRC #architecture #case study #experience
An Experience Report on Detecting and Repairing Software Architecture Erosion (FAF, RR, MZ, CR, RC), pp. 21–30.
WICSAWICSA-2016-YuanM #architecture #component #interactive #mining #security
Mining Software Component Interactions to Detect Security Threats at the Architectural Level (EY, SM), pp. 211–220.
EDMEDM-2016-BlanchardDOSKSW #automation #education
Semi-Automatic Detection of Teacher Questions from Human-Transcripts of Audio in Live Classrooms (NB, PJD, AO, BS, SK, XS, BW, MN, SKD), pp. 288–291.
EDMEDM-2016-HuttMWDD #learning
The Eyes Have It: Gaze-based Detection of Mind Wandering during Learning with an Intelligent Tutoring System (SH, CM, SW, PJD, SKD), pp. 86–93.
EDMEDM-2016-MatsudaCS #how #question
How quickly can wheel spinning be detected? (NM, SC, JCS), pp. 607–608.
EDMEDM-2016-MillsBWD #automation
Automatic Gaze-Based Detection of Mind Wandering during Film Viewing (CM, RB, XW, SKD), pp. 30–37.
ICPCICPC-2016-MakiharaIYFI #behaviour #programming
Detecting exploratory programming behaviors for introductory programming exercises (EM, HI, NY, KF, HI), pp. 1–4.
ICPCICPC-2016-OguraYHHK #exclamation #injection #java
Hey! Are you injecting side effect?: A tool for detecting purity changes in java methods (NO, JY, KH, YH, SK), pp. 1–3.
ICPCICPC-2016-PalombaPLOZ #smell
A textual-based technique for Smell Detection (FP, AP, ADL, RO, AZ), pp. 1–10.
ICPCICPC-2016-VasquezHP #android #automation #on the
On automatically detecting similar Android apps (MLV, AH, DP), pp. 1–10.
ICSMEICSME-2016-FontanaPRZ #architecture #automation #smell
Automatic Detection of Instability Architectural Smells (FAF, IP, RR, MZ), pp. 433–437.
ICSMEICSME-2016-Palomba #smell
Alternative Sources of Information for Code Smell Detection: Postcards from Far Away (FP), pp. 636–640.
ICSMEICSME-2016-PuntVZ16a #css #refactoring
A Tool for Detecting and Refactoring the A?B*A Pattern in CSS (LP, SV, VZ), p. 613.
ICSMEICSME-2016-RostamiEMT #javascript
Detecting Function Constructors in JavaScript (SR, LME, DM, NT), pp. 488–492.
ICSMEICSME-2016-SvajlenkoR #clone detection #evaluation #framework #named
BigCloneEval: A Clone Detection Tool Evaluation Framework with BigCloneBench (JS, CKR), pp. 596–600.
ICSMEICSME-2016-WuHTW #web
Detect Cross-Browser Issues for JavaScript-Based Web Applications Based on Record/Replay (GW, MH, HT, JW0), pp. 78–87.
MSRMSR-2016-AhmedBCHS #case study #effectiveness #experience #performance #tool support #web
Studying the effectiveness of application performance management (APM) tools for detecting performance regressions for web applications: an experience report (TMA, CPB, THC, AEH, WS), pp. 1–12.
MSRMSR-2016-AmannNNNM #benchmark #metric #named
MUBench: a benchmark for API-misuse detectors (SA, SN, HAN, TNN, MM), pp. 464–467.
MSRMSR-2016-GomezRAS #android #automation #mining #performance #repository #user interface
Mining test repositories for automatic detection of UI performance regressions in Android apps (MG0, RR, BA, LS), pp. 13–24.
MSRMSR-2016-IshioKKGI #component #java #reuse
Software ingredients: detection of third-party component reuse in Java software release (TI, RGK, TK0, DMG, KI), pp. 339–350.
MSRMSR-2016-MantylaADGO #mining #question
Mining valence, arousal, and dominance: possibilities for detecting burnout and productivity? (MM, BA, GD, DG, MO), pp. 247–258.
SANERSANER-2016-MloukiKA #android #ecosystem #on the
On the Detection of Licenses Violations in the Android Ecosystem (OM, FK, GA), pp. 382–392.
SCAMSCAM-2016-HollandSAK #algorithm #complexity #dynamic analysis #tool support
Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities (BH, GRS, PA, SK), pp. 79–84.
DLTDLT-2016-Basten #ambiguity #automaton #multi #using
Context-Free Ambiguity Detection Using Multi-stack Pushdown Automata (HJSB), pp. 1–12.
FMFM-2016-BohmMJ #concurrent #reduction
State-Space Reduction of Non-deterministically Synchronizing Systems Applicable to Deadlock Detection in MPI (SB, OM, PJ), pp. 102–118.
IFM-2016-AlbertGI #concurrent #static analysis #testing
Combining Static Analysis and Testing for Deadlock Detection (EA, MGZ, MI), pp. 409–424.
CoGCIG-2016-IkedaVS
Detection and labeling of bad moves for coaching go (KI, SV, NS), pp. 1–8.
CIKMCIKM-2016-0064NRR #framework #identification #learning #multi
A Multiple Instance Learning Framework for Identifying Key Sentences and Detecting Events (WW0, YN, HR, NR), pp. 509–518.
CIKMCIKM-2016-AlabdulmohsinHS #graph
Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph (IMA, YH, YS, XZ0), pp. 2395–2400.
CIKMCIKM-2016-HeindorfPSE
Vandalism Detection in Wikidata (SH, MP, BS0, GE), pp. 327–336.
CIKMCIKM-2016-JangFDA #probability
Probabilistic Approaches to Controversy Detection (MJ, JF, SDH, JA), pp. 2069–2072.
CIKMCIKM-2016-JinFF #approach #collaboration
A Context-aware Collaborative Filtering Approach for Urban Black Holes Detection (LJ, ZF, LF), pp. 2137–2142.
CIKMCIKM-2016-LiangP #robust
Robust Contextual Outlier Detection: Where Context Meets Sparsity (JL, SP0), pp. 2167–2172.
CIKMCIKM-2016-LiuLNFTAKVPWMDV #realtime #scalability #twitter #verification
Reuters Tracer: A Large Scale System of Detecting & Verifying Real-Time News Events from Twitter (XL, QL, AN, RF, MT, KA, RK, MV, SP, RW, RM, JD, AV, WK, SS), pp. 207–216.
CIKMCIKM-2016-LiuLZZMYL #query
Detecting Promotion Campaigns in Query Auto Completion (YL, YL, KZ0, MZ0, SM, YY, HL), pp. 125–134.
CIKMCIKM-2016-LiuZCC #graph #statistics #topic
Graph Topic Scan Statistic for Spatial Event Detection (YL, BZ, FC0, DWC), pp. 489–498.
CIKMCIKM-2016-SampsonMWL #social #social media
Leveraging the Implicit Structure within Social Media for Emergent Rumor Detection (JS, FM, LW0, HL0), pp. 2377–2382.
CIKMCIKM-2016-SuyehiraS #named #wiki
DePP: A System for Detecting Pages to Protect in Wikipedia (KS, FS), pp. 2081–2084.
CIKMCIKM-2016-TutekGSMB #concept #knowledge base #ranking #using
Detecting and Ranking Conceptual Links between Texts Using a Knowledge Base (MT, GG, JS, NMF, BDB), pp. 2077–2080.
CIKMCIKM-2016-Wang0PB #algorithm #cpu #online #self
A Self-Learning and Online Algorithm for Time Series Anomaly Detection, with Application in CPU Manufacturing (XW0, JL0, NP, MB), pp. 1823–1832.
CIKMCIKM-2016-WangZHZ #fault #wiki
Error Link Detection and Correction in Wikipedia (CW0, RZ0, XH, AZ), pp. 307–316.
ECIRECIR-2016-PotthastKSH
Clickbait Detection (MP, SK, BS0, MH), pp. 810–817.
ECIRECIR-2016-SochenkovZTSSSO
Exactus Like: Plagiarism Detection in Scientific Texts (IS, DZ, IT, IS, AS, RS, GSO), pp. 837–840.
ICMLICML-2016-GuhaMRS #random #robust
Robust Random Cut Forest Based Anomaly Detection on Streams (SG, NM, GR, OS), pp. 2712–2721.
ICMLICML-2016-SangnierGR #proximity #reliability #representation #using
Early and Reliable Event Detection Using Proximity Space Representation (MS, JG, AR), pp. 2310–2319.
ICMLICML-2016-ZhaiCLZ #energy #modelling
Deep Structured Energy Based Models for Anomaly Detection (SZ, YC, WL, ZZ), pp. 1100–1109.
ICPRICPR-2016-0003BP #3d #symmetry
Detection and characterization of Intrinsic symmetry of 3D shapes (AM0, SMB, FP), pp. 1815–1820.
ICPRICPR-2016-AbdicFBARMS #approach #learning
Detecting road surface wetness from audio: A deep learning approach (IA, LF, DEB, WA, BR, EM, BWS), pp. 3458–3463.
ICPRICPR-2016-AghaeiDR #interactive #social
With whom do I interact? Detecting social interactions in egocentric photo-streams (MA, MD, PR), pp. 2959–2964.
ICPRICPR-2016-Altamirano-Gomez #algebra #geometry
Conformal Geometric Algebra method for detection of geometric primitives (GEAG, EBC), pp. 4190–4195.
ICPRICPR-2016-AnZH #online
Online RGB-D tracking via detection-learning-segmentation (NA, XZ, ZGH), pp. 1231–1236.
ICPRICPR-2016-BillingsAB #analysis #image
Ultrasound image analysis for myopathy detection (SB, JA, PB), pp. 1461–1465.
ICPRICPR-2016-BlondelPPLL #collaboration
Dynamic collaboration of far-infrared and visible spectrum for human detection (PB, AP, CP, RL, DL), pp. 698–703.
ICPRICPR-2016-BrownF #smarttech #using
Enhanced face detection using body part detections for wearable cameras (LMB, QF), pp. 715–720.
ICPRICPR-2016-BulatovS #segmentation
Segmentation methods for detection of stationary vehicles in combined elevation and optical data (DB, HS), pp. 603–608.
ICPRICPR-2016-CapuaNP #network #social
Unsupervised cyber bullying detection in social networks (MDC, EDN, AP), pp. 432–437.
ICPRICPR-2016-ChenGLZY
Appearance changes detection during tracking (WC, XG0, XL, EZ, JY), pp. 1821–1826.
ICPRICPR-2016-ChenWHF #estimation #learning
Deep learning for integrated hand detection and pose estimation (TYC, MYW, YHH, LCF), pp. 615–620.
ICPRICPR-2016-ChoiKPS #multi #network
Multi-spectral pedestrian detection based on accumulated object proposal with fully convolutional networks (HC, SK, KP, KS), pp. 621–626.
ICPRICPR-2016-DupontMG #recognition
Detecting low-quality reference time series in stream recognition (MD, PFM, NG), pp. 2556–2561.
ICPRICPR-2016-EggertWZL
Saliency-guided selective magnification for company logo detection (CE, AW, DZ, RL), pp. 651–656.
ICPRICPR-2016-FengSZ #multi
Scene text detection based on multi-scale SWT and edge filtering (YF, YS, YZ0), pp. 645–650.
ICPRICPR-2016-GabrE #runtime
Enhancing the runtime of JUDOCA detector (MG, RE), pp. 669–674.
ICPRICPR-2016-GligorijevicPZ #community #graph #multi
Fusion and community detection in multi-layer graphs (VG, YP, SZ), pp. 1327–1332.
ICPRICPR-2016-GouWWWJ
Learning-by-synthesis for accurate eye detection (CG, YW0, KW, FYW0, QJ), pp. 3362–3367.
ICPRICPR-2016-GuoDFS #robust #using
A robust UAV landing site detection system using mid-level discriminative patches (XG, SD, CF, SS), pp. 1659–1664.
ICPRICPR-2016-HuangWL
Egocentric hand detection via region growth (SH, WW, KL), pp. 639–644.
ICPRICPR-2016-IshiiSIMSIN #classification #multi
Detection by classification of buildings in multispectral satellite imagery (TI, ESS, SI, YM, AS, HI0, RN), pp. 3344–3349.
ICPRICPR-2016-IwataOWK #recognition #retrieval #video
Recognition and transition frame detection of Arabic news captions for video retrieval (SI, WO, TW, FK), pp. 4005–4010.
ICPRICPR-2016-JeongKKN
Facial landmark detection based on an ensemble of local weighted regressors during real driving situation (MJ, JYK, BK, JYN), pp. 2198–2203.
ICPRICPR-2016-JordaoSS #approach #multi
A late fusion approach to combine multiple pedestrian detectors (AJ, JSdS, WRS), pp. 4250–4255.
ICPRICPR-2016-KerautretKDL16a
Centerline detection on partial mesh scans by confidence vote in accumulation map (BK, AK, IDR, JOL), pp. 1376–1381.
ICPRICPR-2016-KilicarslanZR
Pedestrain detection from motion (MK, JYZ, KR), pp. 1857–1863.
ICPRICPR-2016-KimP #approach #network #using
A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
ICPRICPR-2016-KondratevS #automation #constraints #geometry #image #using
Automatic detection of laser-induced structures in live cell fluorescent microscopy images using snakes with geometric constraints (AYK, DVS), pp. 331–336.
ICPRICPR-2016-KovvuriNS #modelling
Segment-based models for event detection and recounting (RK, RN, CGMS), pp. 3868–3873.
ICPRICPR-2016-KuranukiP
Minimal filtered channel features for pedestrian detection (YK, IP), pp. 681–686.
ICPRICPR-2016-LangenkamperN #architecture #classification #learning #online #realtime
COATL - a learning architecture for online real-time detection and classification assistance for environmental data (DL, TWN), pp. 597–602.
ICPRICPR-2016-LeHWO #performance
Temporally subsampled detection for accurate and efficient face tracking and diarization (NL, AH, DW0, JMO), pp. 1792–1797.
ICPRICPR-2016-LeZZLS #robust
Robust hand detection in Vehicles (THNL, CZ, YZ, KL, MS), pp. 573–578.
ICPRICPR-2016-LiH #approach #image #performance
A fast approach for traffic panel detection from natural scene images (ZML, LLH), pp. 579–584.
ICPRICPR-2016-LiKZYP #anti
Generalized face anti-spoofing by detecting pulse from face videos (XL, JK, GZ, PCY, MP), pp. 4244–4249.
ICPRICPR-2016-LuYLLZ
Edge chain detection by applying Helmholtz principle on gradient magnitude map (XL, JY, LL0, YL, WZ), pp. 1364–1369.
ICPRICPR-2016-MaioranoP
Granular trajectory based anomaly detection for surveillance (FM, AP), pp. 2066–2072.
ICPRICPR-2016-MinciulloC #analysis #automation
Fully automated shape analysis for detection of Osteoarthritis from lateral knee radiographs (LM, TFC), pp. 3787–3791.
ICPRICPR-2016-MollerNN16a #clustering #image #using
Change detection in marine observatory image streams using Bi-Domain Feature Clustering (TM, IN, TWN), pp. 793–798.
ICPRICPR-2016-MuthuswamyR
Salient object detection in tracking shots (KM, DR), pp. 1780–1785.
ICPRICPR-2016-NakamuraOB #process
Detection of groups in crowd considering their activity state (KN, TO, NB), pp. 277–282.
ICPRICPR-2016-Ohn-BarT #locality #modelling #multi
Detection and localization with multi-scale models (EOB, MMT), pp. 1382–1387.
ICPRICPR-2016-Ohn-BarT16a
To boost or not to boost? On the limits of boosted trees for object detection (EOB, MMT), pp. 3350–3355.
ICPRICPR-2016-OrtellsM #case study
Detection of duplicate identities in streams of biometric samples: A gait-based case study (JO, RAM), pp. 2983–2988.
ICPRICPR-2016-PalaniappanPAVF #using
Moving object detection for vehicle tracking in Wide Area Motion Imagery using 4D filtering (KP, MP, HA, RV, JF, FB, AB, SS, EB, RMR, GS), pp. 2830–2835.
ICPRICPR-2016-PangN #3d #multi #network
3D point cloud object detection with multi-view convolutional neural network (GP, UN), pp. 585–590.
ICPRICPR-2016-PeiYKY #multi
Multi-orientation scene text detection with multi-information fusion (WYP, CY, LJK, XCY), pp. 657–662.
ICPRICPR-2016-Prado-RomeroA
Detecting contextual collective anomalies at a Glance (MAPR, AGA), pp. 2532–2537.
ICPRICPR-2016-QinSLPT #categorisation #recognition #video
Video scene text frames categorization for text detection and recognition (LQ, PS, TL, UP0, CLT), pp. 3886–3891.
ICPRICPR-2016-QuachtranHS #learning #using
Detection of Intracranial Hypertension using Deep Learning (BQ, RBH, FS), pp. 2491–2496.
ICPRICPR-2016-Ren0YZH0 #novel #recognition
A novel text structure feature extractor for Chinese scene text detection and recognition (XR, KC0, XY, YZ0, JH, JS0), pp. 3380–3385.
ICPRICPR-2016-Sahbi #image #interactive
Misalignment resilient CCA for interactive satellite image change detection (HS), pp. 3326–3331.
ICPRICPR-2016-SalaunMM16a #multi #robust
Multiscale line segment detector for robust and accurate SfM (YS, RM, PM), pp. 2000–2005.
ICPRICPR-2016-ShanXS #video
A new method for spatiotemporal textual saliency detection in video (SS, HX, FS), pp. 3240–3245.
ICPRICPR-2016-SidibeRM #multi #on the #using
On spatio-temporal saliency detection in videos using multilinear PCA (DS, MR, FM), pp. 1876–1880.
ICPRICPR-2016-SinghTSV
Detection of glare in night photography (MS, RKT, KS, AV), pp. 865–870.
ICPRICPR-2016-SuCHH #image #modelling #recognition #symmetry #using
Moment-based symmetry detection for scene modeling and recognition using RGB-D images (JYS, SCC, JWH, THH), pp. 3621–3626.
ICPRICPR-2016-SukS #analysis #retrieval
Solar flare retrieval, detection and analysis (TS, SS), pp. 1183–1188.
ICPRICPR-2016-SunBTTH #learning #locality #using
Tattoo detection and localization using region-based deep learning (ZS, JB, PT, MT, AH), pp. 3055–3060.
ICPRICPR-2016-SunHL #image #using
Context based face spoofing detection using active near-infrared images (XS0, LH0, CL), pp. 4262–4267.
ICPRICPR-2016-SwamiDKV #image #robust
A robust flash image shadow detection method and seamless recovery of shadow regions (KS, SKD, GK, AV), pp. 2836–2841.
ICPRICPR-2016-TakabeTKSMNY #consistency #using
Moving object detection from a point cloud using photometric and depth consistencies (AT, HT, NK, TS, TM, SN, NY), pp. 561–566.
ICPRICPR-2016-TakezawaHT #documentation #image #using
Camera-captured document image perspective distortion correction using vanishing point detection based on Radon transform (YT, MH, ST), pp. 3968–3974.
ICPRICPR-2016-TianMO #embedded #low cost #recognition #using
Spoofing detection for embedded face recognition system using a low cost stereo camera (GT, TM, YO), pp. 1017–1022.
ICPRICPR-2016-Triantafyllidou #incremental #learning #network
Face detection based on deep convolutional neural networks exploiting incremental facial part learning (DT, AT), pp. 3560–3565.
ICPRICPR-2016-VandoniHA #process
Crack detection based on a Marked Point Process model (JV, SLHM, EA), pp. 3933–3938.
ICPRICPR-2016-VoTPV #classification #modelling
Model-based classification and novelty detection for point pattern data (BNV, NQT, DQP, BTV), pp. 2622–2627.
ICPRICPR-2016-WangZQL #framework
RGB-D saliency detection under Bayesian framework (STW, ZZ, HBQ, BL), pp. 1881–1886.
ICPRICPR-2016-WangZYP #classification
Anomaly detection in crowded scenes by SL-HOF descriptor and foreground classification (SW, EZ, JY, FP), pp. 3398–3403.
ICPRICPR-2016-Yamada #network
Pedestrian detection with a resolution-aware convolutional network (KY), pp. 591–596.
ICPRICPR-2016-YamashitaFYF #multi #network #using
Pedestrian and part position detection using a regression-based multiple task deep convolutional neural network (TY, HF, YY, HF), pp. 3500–3505.
ICPRICPR-2016-YangN #multi #network
A multi-scale cascade fully convolutional network face detector (ZY, RN), pp. 633–638.
ICPRICPR-2016-YangSZ #network
A joint facial point detection method of deep convolutional network and shape regression (TY, CS, NZ), pp. 543–548.
ICPRICPR-2016-YunLYKC
Attention-inspired moving object detection in monocular dashcam videos (KY, JL, SY, SWK, JYC0), pp. 2706–2711.
ICPRICPR-2016-ZayeneHTMHIA #contest #recognition #video
ICPR2016 contest on Arabic Text detection and Recognition in video frames - AcTiVComp (OZ, NH, SMT, SBM, JH, RI, NEBA), pp. 187–191.
ICPRICPR-2016-ZemeneTPP #clustering #set #using
Simultaneous clustering and outlier detection using dominant sets (EZ, YTT, AP0, MP), pp. 2325–2330.
ICPRICPR-2016-ZhangHMCP #3d #analysis #image
Face spoofing detection based on 3D lighting environment analysis of image pair (XZ, XH, MM, CC0, SP), pp. 2995–3000.
ICPRICPR-2016-ZhangXLPQ #image #robust
Robust road detection from a single image (JZ, SYX, KL, HP, AKQ), pp. 859–864.
ICPRICPR-2016-ZhangZ #effectiveness #video
Effective real-scenario Video Copy Detection (YZ, XZ), pp. 3951–3956.
ICPRICPR-2016-ZhangZZB #symmetry
Symmetry-based object proposal for text detection (XZ, ZZ, CZ, XB), pp. 709–714.
KDDKDD-2016-BurgessGKWWHG #reuse
The Legislative Influence Detector: Finding Text Reuse in State Legislation (MB, EG, JKS, JW, DW, LH, RG), pp. 57–66.
KDDKDD-2016-DuLZHX #scalability
Catch Me If You Can: Detecting Pickpocket Suspects from Large-Scale Transit Records (BD, CL, WZ, ZH, HX), pp. 87–96.
KDDKDD-2016-HeLMCSY #community #composition
Joint Community and Structural Hole Spanner Detection via Harmonic Modularity (LH0, CTL, JM, JC, LS, PSY), pp. 875–884.
KDDKDD-2016-HuVQ #performance
Temporal Order-based First-Take-All Hashing for Fast Attention-Deficit-Hyperactive-Disorder Detection (HH, JVG, GJQ), pp. 905–914.
KDDKDD-2016-ManzoorMA #graph #performance #streaming
Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs (EAM, SMM, LA), pp. 1035–1044.
KDDKDD-2016-MelnykBMO #markov #modelling
Semi-Markov Switching Vector Autoregressive Model-Based Anomaly Detection in Aviation Systems (IM, AB, BLM, NCO), pp. 1065–1074.
KDDKDD-2016-NandiMADB #control flow #execution #graph #mining #using
Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs (AN, AM, SA, GBD, SB), pp. 215–224.
KDDKDD-2016-PaparrizosWH
Detecting Devastating Diseases in Search Logs (JP, RWW, EH), pp. 559–568.
KDDKDD-2016-ReisFMB #incremental #online #performance #using
Fast Unsupervised Online Drift Detection Using Incremental Kolmogorov-Smirnov Test (DMdR, PAF, SM, GEAPAB), pp. 1545–1554.
KDDKDD-2016-XuYYXZ #network
Talent Circle Detection in Job Transition Networks (HX, ZY0, JY, HX, HZ), pp. 655–664.
KDDKDD-2016-ZhaoATBDBKD #approach #parametricity #strict #using
A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
ICMTICMT-2016-StrueberPA #clone detection #graph #model transformation #transformation language
Clone Detection for Graph-Based Model Transformation Languages (DS, JP, VA), pp. 191–206.
MoDELSMoDELS-2016-DeVriesC #analysis #automation #requirements
Automatic detection of incomplete requirements via symbolic analysis (BD, BHCC), pp. 385–395.
OOPSLAOOPSLA-2016-HuangR #concurrent #precise
Precise and maximal race detection from incomplete traces (JH0, AKR), pp. 462–476.
AdaEuropeAdaEurope-2016-LaaliLHSS #fault #online #testing #using
Test Case Prioritization Using Online Fault Detection Information (ML, HL, MH, MS, HWS), pp. 78–93.
PLDIPLDI-2016-EizenbergHPD #named #online #virtual machine
Remix: online detection and repair of cache contention for the JVM (AE, SH, GP, JD), pp. 251–265.
ASEASE-2016-ChengPJZYZ #mining
Mining revision histories to detect cross-language clones without intermediates (XC, ZP, LJ, HZ, HY, JZ), pp. 696–701.
ASEASE-2016-DegiovanniRACA #satisfiability
Goal-conflict detection based on temporal satisfiability checking (RD, NR, DA, PFC, NA), pp. 507–518.
ASEASE-2016-DemuthRE #consistency #developer #multi #nondeterminism #performance
Efficient detection of inconsistencies in a multi-developer engineering environment (AD, MRE, AE), pp. 590–601.
ASEASE-2016-LinZCZ #api #java #named
LockPeeker: detecting latent locks in Java APIs (ZL, HZ, YC, JZ), pp. 368–378.
ASEASE-2016-PeldszusKLS #design #evolution #incremental #multi #object-oriented #pattern matching #source code #using
Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching (SP, GK, ML, SS), pp. 578–589.
ASEASE-2016-VojdaniARSVV #approach #concurrent
Static race detection for device drivers: the Goblint approach (VV, KA, VR, HS, VV, RV), pp. 391–402.
ASEASE-2016-WangCMT #debugging #modelling #n-gram #named
Bugram: bug detection with n-gram language models (SW, DC, DMA, LT), pp. 708–719.
ASEASE-2016-WeiLC #android
Taming Android fragmentation: characterizing and detecting compatibility issues for Android apps (LW, YL, SCC), pp. 226–237.
ASEASE-2016-WhiteTVP #clone detection #learning
Deep learning code fragments for code clone detection (MW, MT, CV, DP), pp. 87–98.
ASEASE-2016-WuLDYZ #android #effectiveness #named #static analysis
Relda2: an effective static analysis tool for resource leak detection in Android apps (TW, JL, XD, JY, JZ), pp. 762–767.
FSEFSE-2016-CaiZCL #concurrent
A deployable sampling strategy for data race detection (YC0, JZ, LC, JL), pp. 810–821.
FSEFSE-2016-DhokR #generative #testing
Directed test generation to detect loop inefficiencies (MD, MKR), pp. 895–907.
FSEFSE-2016-DouCGXXW #smell #spreadsheet
Detecting table clones and smells in spreadsheets (WD, SCC, CG, CX0, LX, JW0), pp. 787–798.
FSEFSE-2016-GyoriLSLM #api #debugging #java #named #specification
NonDex: a tool for detecting and debugging wrong assumptions on Java API specifications (AG, BL, AS, OL, DM), pp. 993–997.
FSEFSE-2016-HuangZT #analysis #correlation
Detecting sensitive data disclosure via bi-directional text correlation analysis (JH0, XZ0, LT0), pp. 169–180.
FSEFSE-2016-Kellogg #debugging #generative #testing
Combining bug detection and test case generation (MK), pp. 1124–1126.
FSEFSE-2016-LiuXCT #android #comprehension
Understanding and detecting wake lock misuses for Android applications (YL, CX0, SCC, VT), pp. 396–409.
FSEFSE-2016-SuBHSKJ
Code relatives: detecting similarly behaving software (FHS, JB0, KH, SS, GEK, TJ), pp. 702–714.
FSEFSE-2016-WangZHXZ0 #fault #float
Detecting and fixing precision-specific operations for measuring floating-point errors (RW, DZ, XH, YX, LZ0, GH0), pp. 619–630.
FSEFSE-2016-Xu0ZX #analysis #debugging #predict #python
Python predictive analysis for bug detection (ZX, PL0, XZ0, BX), pp. 121–132.
FSEFSE-2016-YogaNG #concurrent #parallel #source code
Parallel data race detection for task parallel programs with locks (AY, SN, AG), pp. 833–845.
FSEFSE-2016-ZhanH #concurrent #ide #named
ECHO: instantaneous in situ race detection in the IDE (SZ, JH0), pp. 775–786.
FSEFSE-2016-ZhouW #analysis #api #web
API deprecation: a retrospective analysis and detection method for code examples on the web (JZ, RJW), pp. 266–277.
ICSE-2016-CheungCLX #automation #clustering #named #smell #spreadsheet #using
CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features (SCC, WC, YL, CX0), pp. 464–475.
ICSE-2016-LiuCB #dynamic analysis #fault #named #performance #precise
DoubleTake: fast and precise error detection via evidence-based dynamic analysis (TL, CC, EDB), pp. 911–922.
ICSE-2016-SajnaniSSRL #clone detection #named #scalability
SourcererCC: scaling code clone detection to big-code (HS, VS, JS, CKR, CVL), pp. 1157–1168.
ICSE-2016-SlavinWHHKBBN #android #framework #policy #privacy #towards
Toward a framework for detecting privacy policy violations in android application code (RS, XW, MBH, JH, RK, JB, TDB, JN0), pp. 25–36.
ASPLOSASPLOS-2016-ZhangLJ #concurrent #hardware #memory management #named #performance #transaction #using
TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory (TZ, DL, CJ), pp. 159–173.
CASECASE-2016-FernandesYDS #privacy #smarttech #social
Detection of privacy-sensitive situations for social robots in smart homes (FEFJ, GY, HMD, WS), pp. 727–732.
CASECASE-2016-GonzalezF #online #process
MEMS accelerometer-based system for inexpensive online CNC milling process chatter detection (DMOG, JCEF), pp. 978–983.
CASECASE-2016-LiZHS #fault #identification
Fusing system configuration information for building cooling plant Fault Detection and severity level identification (DL, YZ, GH, CJS), pp. 1319–1325.
CASECASE-2016-SyJDD #clustering #graph
Graph-based clustering for detecting frequent patterns in event log data (ES, SAJ, AD, YD0), pp. 972–977.
CASECASE-2016-WangG #fault #online
On-line fault detection and diagnosis for chiller system (PW, RG), pp. 1313–1318.
CCCC-2016-NgY #concurrent #graph #synthesis
Static deadlock detection for concurrent go by global session graph synthesis (NN, NY), pp. 174–184.
CCCC-2016-RodriguesPA #representation
Sparse representation of implicit flows with applications to side-channel detection (BR, FMQP, DFA), pp. 110–120.
CCCC-2016-WuYR #android #energy #fault #static analysis
Static detection of energy defect patterns in Android applications (HW, SY, AR), pp. 185–195.
CGOCGO-2016-LiuL #effectiveness #named
Cheetah: detecting false sharing efficiently and effectively (TL, XL0), pp. 1–11.
CGOCGO-2016-TymburibaMP #branch
Inference of peak density of indirect branches to detect ROP attacks (MT, REAM, FMQP), pp. 150–159.
FASEFASE-2016-WeckesserLSRS #automation #bound #exclamation #feature model #modelling
Mind the Gap! Automated Anomaly Detection for Potentially Unbounded Cardinality-Based Feature Models (MW, ML, TS, BR, AS), pp. 158–175.
ICSTICST-2016-AlameerMH #web
Detecting and Localizing Internationalization Presentation Failures in Web Applications (AA, SM, WGJH), pp. 202–212.
ICSTICST-2016-ArcainiGV #automation #consistency #fault #feature model #modelling
Automatic Detection and Removal of Conformance Faults in Feature Models (PA, AG, PV), pp. 102–112.
ICSTICST-2016-ShiGLM #implementation #nondeterminism #specification
Detecting Assumptions on Deterministic Implementations of Non-deterministic Specifications (AS, AG, OL, DM), pp. 80–90.
ICSTICST-2016-YeZWL #debugging #empirical
An Empirical Study on Detecting and Fixing Buffer Overflow Bugs (TY, LZ, LW, XL), pp. 91–101.
ECSAECSA-2015-HansenM #automation #community #composition #using
(Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
WICSAWICSA-2015-BangM #design #higher-order
Proactive Detection of Higher-Order Software Design Conflicts (JYB, NM), pp. 155–164.
WICSAWICSA-2015-MoCKX #architecture #automation #smell
Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells (RM, YC, RK, LX), pp. 51–60.
DocEngDocEng-2015-BarabucciBIMM #documentation #modelling #visualisation
Document Changes: Modeling, Detection, Storage and Visualization (DChanges 2015) (GB, UMB, ADI, SM, EVM), pp. 227–228.
DocEngDocEng-2015-WuS #evolution
Detecting XSLT Rules Affected by Schema Evolution (YW, NS), pp. 143–146.
DRRDRR-2015-DeMDC #documentation #image
Detection of electrical circuit elements from documents images (PD, SM, AKD, BC).
HTHT-2015-KumarDCC #social #social media
Detecting Changes in Suicide Content Manifested in Social Media Following Celebrity Suicides (MK, MD, GC, MDC), pp. 85–94.
HTHT-2015-SchulzSS
Small-Scale Incident Detection based on Microposts (AS, BS, TS), pp. 3–12.
SIGMODSIGMOD-2015-YanZHSMZM #distributed #using
Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
TPDLTPDL-2015-AlNoamanyWN #topic #web
Detecting Off-Topic Pages in Web Archives (YA, MCW, MLN), pp. 225–237.
VLDBVLDB-2015-ChuWLHP #clustering #named #scalability
ALID: Scalable Dominant Cluster Detection (LC, SW, SL, QH, JP), pp. 826–837.
VLDBVLDB-2015-PotharajuCHNWZJ #automation #knowledge base #named
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection (RP, JC, LH, CNR, MW, LZ, NJ), pp. 1828–1839.
VLDBVLDB-2015-WangWYZ #benchmark #community #framework #metric #network #social
Community Detection in Social Networks: An In-depth Benchmarking Study with a Procedure-Oriented Framework (MW, CW, JXY, JZ), pp. 998–1009.
VLDBVLDB-2015-WuJLZ #community #robust
Robust Local Community Detection: On Free Rider Effect and Its Elimination (YW, RJ, JL, XZ), pp. 798–809.
EDMEDM-2015-ChenBD #learning
Video-Based Affect Detection in Noninteractive Learning Environments (YC, NB, SKD), pp. 440–443.
EDMEDM-2015-Garcia-SaizZ #consistency #performance
Detection of Learners with a Performance Inconsistent with Their Effort (DGS, MEZ), pp. 606–607.
EDMEDM-2015-JohnPM #graph #problem #question #semantics #similarity #word
Semantic Similarity Graphs of Mathematics Word Problems: Can Terminology Detection Help? (RJLJ, RJP, TSM), pp. 452–455.
EDMEDM-2015-KaiPBBDOSV #comparison #physics
A Comparison of Face-based and Interaction-based Affect Detectors in Physics Playground (SK, LP, RSB, NB, SKD, JO, VS, MV), pp. 77–84.
EDMEDM-2015-KoprinskaSY #student
Students at Risk: Detection and Remediation (IK, JS, KY), pp. 512–515.
EDMEDM-2015-MillsD #online #realtime #towards
Toward a Real-time (Day) Dreamcatcher: Detecting Mind Wandering Episodes During Online Reading (CM, SKD), pp. 69–76.
EDMEDM-2015-PaquetteRBMLDBS #comparison #multi
Sensor-Free or Sensor-Full: A Comparison of Data Modalities in Multi-Channel Affect Detection (LP, JPR, RSB, BWM, JCL, JD, KWB, RAS, VG), pp. 93–100.
SCAMSCAM-J-2013-CeruloPBCC15 #markov #named
Irish: A Hidden Markov Model to detect coded information islands in free text (LC, MDP, AB, MC, GC), pp. 26–43.
ICPCICPC-2015-BenomarASPS #development #evolution #process
Detection of software evolution phases based on development activities (OB, HA, HAS, PP, MAS), pp. 15–24.
ICPCICPC-2015-SohTAW #android #user interface
Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
ICSMEICSME-2015-Aniche #development #smell #web
Detection strategies of smells in web software development (MFA), pp. 598–601.
ICSMEICSME-2015-LuciaDGR #automation #behaviour #design pattern #dynamic analysis #towards
Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
ICSMEICSME-2015-LuciaDGRP #behaviour #design pattern #named
ePadEvo: A tool for the detection of behavioral design patterns (ADL, VD, CG, MR, CP), pp. 327–329.
ICSMEICSME-2015-PoluriR #concurrent
Deterministic dynamic race detection across program versions (SVP, MKR), pp. 181–190.
ICSMEICSME-2015-SvajlenkoR #clone detection #tool support
Evaluating clone detection tools with BigCloneBench (JS, CKR), pp. 131–140.
ICSMEICSME-2015-VasquezVLP #android #developer #how #performance
How developers detect and fix performance bottlenecks in Android apps (MLV, CV, QL, DP), pp. 352–361.
MSRMSR-2015-SinhaSDPM #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
MSRMSR-2015-WuMKGI #consistency #nondeterminism #open source #scalability
A Method to Detect License Inconsistencies in Large-Scale Open Source Projects (YW, YM, TK, DMG, KI), pp. 324–333.
SANERSANER-2015-AggarwalRTHGS #debugging #re-engineering
Detecting duplicate bug reports with software engineering domain knowledge (KA, TR, FT, AH, RG, ES), pp. 211–220.
SANERSANER-2015-HeroldEBCC #modelling
Detection of violation causes in reflexion models (SH, ME, JB, SC, MÓC), pp. 565–569.
SANERSANER-2015-Keivanloo0Z #clone detection #java #repository #scalability
Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
SANERSANER-2015-SassoML #problem
Misery loves company: CrowdStacking traces to aid problem detection (TDS, AM, ML), pp. 131–140.
SANERSANER-2015-YangMT #design pattern #quality
Measuring the quality of design pattern detection results (SY, AM, VT), pp. 53–62.
SCAMSCAM-2015-FenskeSMS #smell #variability
When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
SCAMSCAM-2015-NicolayNRM #javascript
Detecting function purity in JavaScript (JN, CN, CDR, WDM), pp. 101–110.
FMFM-2015-BagheriKMJ #android #bound #design #protocol #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
FDGFDG-2015-ReuterGS #automation #game studies #multi #petri net #using
Detecting structural deadlocks in Multiplayer Games using automatically generated Petri Nets (CR0, SG0, RS).
CoGVS-Games-2015-Cejka #using
Continuous Collision Detection Using Tetrahedral Structures (JC), pp. 1–4.
GaMGaM-2015-KulcsarDLVS #graph transformation
Improved Conflict Detection for Graph Transformation with Attributes (GK, FD, ML, GV, AS), pp. 97–112.
GaMGaM-2015-RadwanH #refactoring #smell
Detecting and Refactoring Operational Smells within the Domain Name System (MR, RH), pp. 113–128.
GaMGaM-2015-Wijs #confluence #lts
Confluence Detection for Transformations of Labelled Transition Systems (AW), pp. 1–15.
CHICHI-2015-GoelZVP #flexibility #gesture #named #using
Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHICHI-2015-HuberLP
Detecting User Intention at Public Displays from Foot Positions (BH, JHL, JHP), pp. 3899–3902.
CHICHI-2015-KimCD #interactive #monitoring
Sensors Know When to Interrupt You in the Car: Detecting Driver Interruptibility Through Monitoring of Peripheral Interactions (SK, JC, AKD), pp. 487–496.
CHICHI-2015-LiYS #interactive #named
IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID (HL, CY, APS), pp. 2555–2564.
CHICHI-2015-ManciniHAG #interface #multi
Re-Centering Multispecies Practices: A Canine Interface for Cancer Detection Dogs (CM, RH, BA, CG), pp. 2673–2682.
CHICHI-2015-OhCKL #documentation #named
ScanShot: Detecting Document Capture Moments and Correcting Device Orientation (JO, WC, JK, UL), pp. 953–956.
CSCWCSCW-2015-AzariaRK
An Agent for Deception Detection in Discussion Based Environments (AA, AR, SK), pp. 218–227.
CSCWCSCW-2015-FreitasD15a #multi #using
Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
HCIHCI-IT-2015-BrahnamRNSB #design
Design of a Bullying Detection/Alert System for School-Wide Intervention (SB, JJR, LN, CLS, SLB), pp. 695–705.
HCIHCI-IT-2015-FukumotoTE #using
Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCIHCI-UC-2015-SanchezA #automation #interface #internet
Automatic Deformations Detection in Internet Interfaces: ADDII (LS, PTAJ), pp. 43–53.
HCIHIMI-IKC-2015-SotokawaMNSI #evaluation
Driving Evaluation of Mild Unilateral Spatial Neglect Patients-Three High-Risk Cases Undetected by BIT After Recovery (TS, TM, JN, YS, MI), pp. 253–261.
HCILCT-2015-Ai #automation #fault #feedback #generative
Automatic Pronunciation Error Detection and Feedback Generation for CALL Applications (RA), pp. 175–186.
HCILCT-2015-CastilloDSTC #student
Model for Detecting Student Difficulties in Solving Formative Assessments (CC, NDD, AS, VT, DAOC), pp. 199–207.
HCISCSM-2015-Kanawati #community #network
Ensemble Selection for Community Detection in Complex Networks (RK), pp. 138–147.
CAiSECAiSE-2015-KhelladiHBRG #evolution #metamodelling
Detecting Complex Changes During Metamodel Evolution (DEK, RH, RB, JR, MPG), pp. 263–278.
CAiSECAiSE-2015-WeilerGS #performance #runtime #twitter
Run-Time and Task-Based Performance of Event Detection Techniques for Twitter (AW, MG, MHS), pp. 35–49.
ICEISICEIS-v1-2015-BedoBOCCRTT #effectiveness #image #performance #social #social media
Techniques for Effective and Efficient Fire Detection from Social Media Images (MVNB, GB, WDO, MTC, AFC, JFRJ, AJMT, CTJ), pp. 34–45.
ICEISICEIS-v1-2015-Xylogiannopoulos #roadmap
Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series (KFX, PK, RA), pp. 346–352.
ICEISICEIS-v2-2015-AlahmadiLN #internet #process #profiling #using
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEISICEIS-v2-2015-CostaMAO #automation #consistency #named #nondeterminism
Fixture — A Tool for Automatic Inconsistencies Detection in Context-aware SPL (PAdSC, FGM, RMdCA, TO), pp. 114–125.
CIKMCIKM-2015-CeroniGF #automation
Improving Event Detection by Automatically Assessing Validity of Event Occurrence in Text (AC, UKG, MF), pp. 1815–1818.
CIKMCIKM-2015-ChaeKCK #api #named
DAAV: Dynamic API Authority Vectors for Detecting Software Theft (DKC, SWK, SjC, YK), pp. 1819–1822.
CIKMCIKM-2015-DoanRSML #profiling
Profiling Pedestrian Distribution and Anomaly Detection in a Dynamic Environment (MTD, SR, MS, MM, CL), pp. 1827–1830.
CIKMCIKM-2015-GribelBA #approach #clustering
A Clustering-based Approach to Detect Probable Outcomes of Lawsuits (DLG, MGdB, LGA), pp. 1831–1834.
CIKMCIKM-2015-HassanLT
Detecting Check-worthy Factual Claims in Presidential Debates (NH, CL, MT), pp. 1835–1838.
CIKMCIKM-2015-KhudaBukhshBW #case study #classification #effectiveness #query #self
Building Effective Query Classifiers: A Case Study in Self-harm Intent Detection (ARK, PNB, RWW), pp. 1735–1738.
CIKMCIKM-2015-MaGWLW #information management #microblog #social #using
Detect Rumors Using Time Series of Social Context Information on Microblogging Websites (JM, WG0, ZW, YL, KFW), pp. 1751–1754.
CIKMCIKM-2015-MiyauchiK #algorithm #community #network #novel #quality #what
What Is a Network Community?: A Novel Quality Function and Detection Algorithms (AM0, YK), pp. 1471–1480.
CIKMCIKM-2015-WuSHY #microblog #social
Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization (FW, JS, YH, ZY), pp. 1601–1610.
CIKMCIKM-2015-ZafaraniL
10 Bits of Surprise: Detecting Malicious Users with Minimum Information (RZ, HL0), pp. 423–431.
ECIRECIR-2015-BuitinckATR #multi
Multi-emotion Detection in User-Generated Reviews (LB, JvA, ET, MdR), pp. 43–48.
ECIRECIR-2015-CaoC #analysis #behaviour #social #social media
Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIRECIR-2015-Dori-HacohenA #automation #web
Automated Controversy Detection on the Web (SDH, JA), pp. 423–434.
ECIRECIR-2015-HagenPBS #classification #sentiment #twitter #using
Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIRECIR-2015-LiangCC #approach #social #social media
A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
ECIRECIR-2015-LimCLK #community #constraints #using
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIRECIR-2015-YangLW
Detecting the Eureka Effect in Complex Search (HY, JL, CW), pp. 734–740.
ICMLICML-2015-AvronH #community #personalisation #rank #using
Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICMLICML-2015-ChangYXY #semantics #using
Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICMLICML-2015-GornitzBK #markov
Hidden Markov Anomaly Detection (NG, MLB, MK), pp. 1833–1842.
ICMLICML-2015-HockingRB #learning #named #segmentation
PeakSeg: constrained optimal segmentation and supervised penalty learning for peak detection in count data (TH, GR, GB), pp. 324–332.
KDDKDD-2015-BeutelAF #behaviour #graph #modelling #predict
Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
KDDKDD-2015-FakhraeiFSG #evolution #multi #network #social
Collective Spammer Detection in Evolving Multi-Relational Social Networks (SF, JRF, MVSS, LG), pp. 1769–1778.
KDDKDD-2015-HayashiMTK #realtime #topic #twitter
Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering (KH, TM, MT, KiK), pp. 417–426.
KDDKDD-2015-LaptevAF #automation #framework #scalability
Generic and Scalable Framework for Automated Time-series Anomaly Detection (NL, SA, IF), pp. 1939–1947.
KDDKDD-2015-LiuC #challenge #social #social media
Social Media Anomaly Detection: Challenges and Solutions (YL, SC), pp. 2317–2318.
KDDKDD-2015-MitzenmacherPPT #clique #network #scalability
Scalable Large Near-Clique Detection in Large-Scale Networks via Sampling (MM, JP, RP, CET, SCX), pp. 815–824.
KDDKDD-2015-NairRKBSKHD #learning #monitoring
Learning a Hierarchical Monitoring System for Detecting and Diagnosing Service Issues (VN, AR, SK, VB, SS, SSK, SH, SD), pp. 2029–2038.
KDDKDD-2015-QahtanAWZ #data type #framework #multi
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams (AAQ, BA, SW, XZ), pp. 935–944.
KDDKDD-2015-RayanaA #metadata #network #overview
Collective Opinion Spam Detection: Bridging Review Networks and Metadata (SR, LA), pp. 985–994.
KDDKDD-2015-ShaoHYZ #community #distance
Community Detection based on Distance Dynamics (JS, ZH, QY, TZ), pp. 1075–1084.
KDDKDD-2015-TsengYHKC #framework #named
FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection (VST, JCY, CWH, YK, KTC), pp. 2157–2166.
SEKESEKE-2015-HughesDH #streaming
Detecting Reporting Anomalies in Streaming Sensing Systems (SH, YD, JOH), pp. 427–432.
SEKESEKE-2015-LinYX #automation #generative #parametricity #testing
Automatic Detection of Parameter Shielding for Test Case Generation (JL, JY, JX), pp. 571–574.
SEKESEKE-2015-SaharAA #approach #case study #image #modelling #prototype
A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
SEKESEKE-2015-SalehianF #embedded #monitoring #realtime
Embedded Real Time Blink Detection System for Driver Fatigue Monitoring (SS, BF), pp. 188–194.
SEKESEKE-2015-SunSWZ #analysis #data flow #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-WanderleyP #folksonomy #learning
Learning Folksonomies for Trend Detection in Task-Oriented Dialogues (GW, ECP), pp. 483–488.
SEKESEKE-2015-WangSZ #execution #symbolic computation
Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection (YW, HS, QZ), pp. 536–539.
SIGIRSIGIR-2015-ChenC #web
Opinion Spammer Detection in Web Forum (YRC, HHC), pp. 759–762.
SIGIRSIGIR-2015-DijkTR #community #topic
Early Detection of Topical Expertise in Community Question Answering (DvD, MT, MdR), pp. 995–998.
SIGIRSIGIR-2015-Dori-Hacohen #analysis
Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIRSIGIR-2015-HeindorfPSE #analysis #corpus #knowledge base #towards
Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
MoDELSMoDELS-2015-StephanC #clone detection #identification #using
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
SPLCSPLC-2015-SoutoGdMKB #debugging #feature model #modelling #performance #product line
Faster bug detection for software product lines with incomplete feature models (SS, DG, Md, DM, SK, DSB), pp. 151–160.
ECOOPECOOP-2015-FangDX #named #performance #problem
PerfBlower: Quickly Detecting Memory-Related Performance Problems via Amplification (LF, LD, G(X), pp. 296–320.
OOPSLAOOPSLA-2015-AchourR #approximate
Approximate computation with outlier detection in Topaz (SA, MCR), pp. 711–730.
OOPSLAOOPSLA-2015-BielikRV #android #concurrent #scalability
Scalable race detection for Android applications (PB, VR, MTV), pp. 332–348.
OOPSLAOOPSLA-2015-HagueLO #approach #css #html
Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
PLDIPLDI-2015-OlivoDL #debugging #performance #static analysis #traversal
Static detection of asymptotic performance bugs in collection traversals (OO, ID, CL), pp. 369–378.
PPDPPPDP-2015-StievenartNMR #abstract interpretation #concurrent #debugging #higher-order #source code
Detecting concurrency bugs in higher-order programs through abstract interpretation (QS, JN, WDM, CDR), pp. 232–243.
REFSQREFSQ-2015-DaunWP #embedded #requirements
Detecting and Correcting Outdated Requirements in Function-Centered Engineering of Embedded Systems (MD, TW, KP), pp. 65–80.
ASEASE-2015-KhatchadourianR #using
Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N) (RK, AR, HM, TW), pp. 641–646.
ASEASE-2015-WalshMK #automation #fault #layout #web
Automatic Detection of Potential Layout Faults Following Changes to Responsive Web Pages (N) (TAW, PM, GMK), pp. 709–714.
ASEASE-2015-WilcoxFFF #array #concurrent #precise
Array Shadow State Compression for Precise Dynamic Race Detection (T) (JRW, PF, CF, SNF), pp. 155–165.
ESEC-FSEESEC-FSE-2015-BellKMD #dependence #java #performance
Efficient dependency detection for safe Java test acceleration (JB, GEK, EM, MD), pp. 770–781.
ESEC-FSEESEC-FSE-2015-CaiC #effectiveness #java #precise #source code
Effective and precise dynamic detection of hidden races for Java programs (YC, LC), pp. 450–461.
ESEC-FSEESEC-FSE-2015-MutluTL #javascript #matter
Detecting JavaScript races that matter (EM, ST, BL), pp. 381–392.
ESEC-FSEESEC-FSE-2015-NguyenNDKN #execution #semantics #variability
Detecting semantic merge conflicts with variability-aware execution (HVN, MHN, SCD, CK, TNN), pp. 926–929.
ESEC-FSEESEC-FSE-2015-RajagopalanH #concurrent #named
RDIT: race detection from incomplete traces (AKR, JH), pp. 914–917.
ESEC-FSEESEC-FSE-2015-SafiSHM
Detecting event anomalies in event-based systems (GS, AS, WGJH, NM), pp. 25–37.
ESEC-FSEESEC-FSE-2015-SamakR #testing
Synthesizing tests for detecting atomicity violations (MS, MKR), pp. 131–142.
ICSEICSE-v1-2015-LiBBKTARBOM #android #component #named #privacy
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
ICSEICSE-v1-2015-NistorCRL #named #performance #problem
CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes (AN, PCC, CR, SL), pp. 902–912.
ICSEICSE-v1-2015-OcarizaP0 #consistency #javascript #mvc #nondeterminism
Detecting Inconsistencies in JavaScript MVC Applications (FSOJ, KP, AM), pp. 325–335.
ICSEICSE-v1-2015-PapadakisJHT #compilation #effectiveness #empirical #equivalence #performance #scalability
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
ICSEICSE-v1-2015-PastoreM #named
ZoomIn: Discovering Failures by Detecting Wrong Assertions (FP, LM), pp. 66–76.
ICSEICSE-v1-2015-ZouWXZSM #algorithm #float #search-based
A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies (DZ, RW, YX, LZ, ZS, HM), pp. 529–539.
ICSEICSE-v2-2015-FooJAHZF #automation #case study #industrial #performance
An Industrial Case Study on the Automated Detection of Performance Regressions in Heterogeneous Environments (KCF, ZMJ, BA, AEH, YZ, PF), pp. 159–168.
ICSEICSE-v2-2015-Hecht #android #approach
An Approach to Detect Android Antipatterns (GH), pp. 766–768.
ICSEICSE-v2-2015-HerzigN #empirical #using
Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSEICSE-v2-2015-HollandDKMR #android #novel #security
Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
ICSEICSE-v2-2015-Palomba #analysis #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
SACSAC-2015-AlvesMM #case study #fault #impact analysis #refactoring #test coverage
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SACSAC-2015-AttiaTHKTC
On-device anomaly detection for resource-limited systems (MBA, CT, AHL, BK, VT, MC), pp. 548–554.
SACSAC-2015-AwadBESAS #anti #approach #process #runtime
Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
SACSAC-2015-BezuBRVVF #component #multi #similarity #web
Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
SACSAC-2015-ColantonioPPS #overview #platform #visual notation
Visual detection of singularities in review platforms (AC, RDP, MP, AS), pp. 1294–1295.
SACSAC-2015-DabainMT #design pattern #using
Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SACSAC-2015-FernandesPCRP #metaheuristic #network #statistics
Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
SACSAC-2015-GotoT #communication #network #visual notation
Anomalous network communication detection system by visual pattern on a client computer (HG, TT), pp. 1263–1269.
SACSAC-2015-HozanoFSFC #developer #feedback #smell #using
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-KrutzMS #analysis #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-MongioviGFPT #analysis #approach #data flow #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-OliveiraQMM #community #complexity #using
Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SACSAC-2015-RegoMP #approach #folksonomy #learning
A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
SACSAC-2015-Rekha #big data #performance #using
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SACSAC-2015-SantiagoPH #approach #modelling
A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
SACSAC-2015-SantosM
Exploring decision drivers on god class detection in three controlled experiments (JAMS, MGM), pp. 1472–1479.
CASECASE-2015-AntonelloGM #fault
Autonomous robotic system for thermographic detection of defects in upper layers of carbon fiber reinforced polymers (MA, SG, EM), pp. 634–639.
CASECASE-2015-BrisimiAZCP
Sensing and classifying roadway obstacles: The street bump anomaly detection and decision support system (TSB, SA, YZ, CGC, ICP), pp. 1288–1293.
CASECASE-2015-ButtersGS #network
Detecting and reducing redundancy in alarm networks (TDB, SG, JLS), pp. 1224–1229.
CASECASE-2015-DamesK #automation #locality #multi #smarttech
Automated detection, localization, and registration of smart devices with multiple robots (PD, VK), pp. 564–571.
CASECASE-2015-KreutzerRREL #automation #metric #using
Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASECASE-2015-SathishRB #approach #industrial #simulation
A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
CASECASE-2015-SundarkumarRNG #api #machine learning #modelling #topic
Malware detection via API calls, topic models and machine learning (GGS, VR, IN, VG), pp. 1212–1217.
CASECASE-2015-WuDZW
Kalman filter based DNS cache poisoning attack detection (HW, XD, LZ, LW), pp. 1594–1600.
CASECASE-2015-ZhangHZ #fault #metric
Fault detection for wireless networked systems with compressed measurements (JZ, XH, DHZ), pp. 356–361.
CASECASE-2015-ZonEHJVSB #delivery #multi #realtime #using
Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
CGOCGO-2015-StepanovS #c++ #memory management #named #performance
MemorySanitizer: fast detector of uninitialized memory use in C++ (ES, KS), pp. 46–55.
DACDAC-2015-CampbellLMC #debugging #fault #hybrid #synthesis #using #validation
Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DACDAC-2015-CampbellVPC #fault #low cost #synthesis
High-level synthesis of error detecting cores through low-cost modulo-3 shadow datapaths (KAC, PV, DZP, DC), p. 6.
DACDAC-2015-LiuHWSJHL #assessment #smarttech
Impact assessment of net metering on smart home cyberattack detection (YL, SH, JW, YS, YJ, YH, XL), p. 6.
DACDAC-2015-RajendranVK
Detecting malicious modifications of data in third-party intellectual property cores (JR, VV, RK), p. 6.
DACDAC-2015-YoonSMC #behaviour #embedded #heatmap #memory management #realtime #using
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DACDAC-2015-ZhouAZYUGUJ #embedded #hardware #using
Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DATEDATE-2015-CakirM #clustering #correlation #hardware #using
Hardware Trojan detection for gate-level ICs using signal correlation based clustering (, SM), pp. 471–476.
DATEDATE-2015-CornaFNS #android
Occupancy detection via iBeacon on Android devices for smart building management (AC, LF, AAN, DS), pp. 629–632.
DATEDATE-2015-CourbonLFT #hardware #performance
A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
DATEDATE-2015-FrancqF #hardware
Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
DATEDATE-2015-HollerKRRK #compilation #evaluation
Evaluation of diverse compiling for software-fault detection (AH, NK, TR, KR, CK), pp. 531–536.
DATEDATE-2015-KanounS #big data #concept #data type #learning #online #scheduling #streaming
Big-data streaming applications scheduling with online learning and concept drift detection (KK, MvdS), pp. 1547–1550.
DATEDATE-2015-KumarAL #fault #monitoring
Operational fault detection and monitoring of a memristor-based LUT (TNK, HAFA, FL), pp. 429–434.
DATEDATE-2015-LiaperdosAT #estimation #fault #probability #testing
A method for the estimation of defect detection probability of analog/RF defect-oriented tests (JL, AA, YT), pp. 1395–1400.
DATEDATE-2015-LinSKRM #debugging #effectiveness #fault #performance #testing #validation
Quick error detection tests with fast runtimes for effective post-silicon validation and debug (DL, ES, SK, ER, SM), pp. 1168–1173.
DATEDATE-2015-NgoEBDGNRR #hardware #metric
Hardware trojan detection by delay and electromagnetic measurements (XTN, IE, SB, JLD, SG, ZN, JBR, BR), pp. 782–787.
DATEDATE-2015-RenTB #learning #statistics
Detection of illegitimate access to JTAG via statistical learning in chip (XR, VGT, RD(B), pp. 109–114.
DATEDATE-2015-TaatizadehN #automation #design #embedded #validation
A methodology for automated design of embedded bit-flips detectors in post-silicon validation (PT, NN), pp. 73–78.
DATEDATE-2015-ZwergerG #symmetry
Detection of asymmetric aging-critical voltage conditions in analog power-down mode (MZ, HEG), pp. 1269–1272.
HPCAHPCA-2015-OzsoyDGAP #framework #online #performance
Malware-aware processors: A framework for efficient online malware detection (MO, CD, IG, NBAG, DVP), pp. 651–661.
HPDCHPDC-2015-BerrocalBDLC #data analysis #lightweight #runtime
Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
PDPPDP-2015-El-KazzazE #framework #scalability #ubiquitous #using
A Hadoop-Based Framework for Large-Scale Landmine Detection Using Ubiquitous Big Satellite Imaging Data (SEK, AEM), pp. 274–278.
PDPPDP-2015-GiitsidisKGS #image
Human and Fire Detection from High Altitude UAV Images (TG, EGK, AG, GCS), pp. 309–315.
PDPPDP-2015-GuthmullerQC #distributed #legacy #similarity #verification
System-Level State Equality Detection for the Formal Dynamic Verification of Legacy Distributed Applications (MG, MQ, GC), pp. 451–458.
PDPPDP-2015-NazarianRMCG #control flow #fault
Bit-Flip Aware Control-Flow Error Detection (GN, DGR, ÁFM, LC, GG), pp. 215–221.
PDPPDP-2015-SkovorodaG #mobile #overview
Review of the Mobile Malware Detection Approaches (AS, DG), pp. 600–603.
PDPPDP-2015-ZhangEHLJ #fault
A Routing-Level Solution for Fault Detection, Masking, and Tolerance in NoCs (XZ, ME, LH, GL, AJ), pp. 365–369.
PPoPPPPoPP-2015-DasSR #communication #concurrent #program analysis #thread
Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
PPoPPPPoPP-2015-McPhersonNSC #legacy #source code
Fence placement for legacy data-race-free programs via synchronization read detection (AJM, VN, SS, MC), pp. 249–250.
ESOPESOP-2015-CalzavaraBCS #fine-grained
Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
ESOPESOP-2015-ChengR #spreadsheet #static analysis
Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
FASEFASE-2015-FedyukovichDHS #bound #dependence #model checking
Symbolic Detection of Assertion Dependencies for Bounded Model Checking (GF, ACD, AEJH, NS), pp. 186–201.
ICSTICST-2015-ArcainiGV #fault #feature model #generative #modelling #testing
Generating Tests for Detecting Faults in Feature Models (PA, AG, PV), pp. 1–10.
ICSTICST-2015-BardinDDKPTM #requirements
Sound and Quasi-Complete Detection of Infeasible Test Requirements (SB, MD, RD, NK, MP, YLT, JYM), pp. 1–10.
ICSTICST-2015-MahajanH #html #locality #using
Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICSTICST-2015-WanJLH #android #energy
Detecting Display Energy Hotspots in Android Apps (MW, YJ, DL, WGJH), pp. 1–10.
ICSTICST-2015-XuLCK #approach #bound #lightweight #thread
A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
ISSTAISSTA-2015-GyoriSHM #dependence #reliability #testing
Reliable testing: detecting state-polluting tests to prevent test dependency (AG, AS, FH, DM), pp. 223–233.
ISSTAISSTA-2015-HayTP #android #communication
Dynamic detection of inter-application communication vulnerabilities in Android (RH, OT, MP), pp. 118–128.
ISSTAISSTA-2015-ShenLPG #automation #performance #profiling #search-based #using
Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ISSTAISSTA-2015-WangGMC #android #approach #clone detection #named #scalability
WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
ISSTAISSTA-2015-XueWLXSC #behaviour #classification #javascript #modelling
Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
ISSTAISSTA-2015-ZhangE #fault
Proactive detection of inadequate diagnostic messages for software configuration errors (SZ, MDE), pp. 12–23.
ICSTSAT-2015-AnsoteguiGLS #community #using
Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
CBSECBSE-2014-DidierM #approach #component
A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
ECSAECSA-2014-PalmaMTG #specification #web #web service
Specification and Detection of SOA Antipatterns in Web Services (FP, NM, GT, YGG), pp. 58–73.
QoSAQoSA-2014-WertOHF #anti #automation #component #performance
Automatic detection of performance anti-patterns in inter-component communications (AW, MO, CH, RF), pp. 3–12.
DocEngDocEng-2014-BarabucciBIMM #documentation #modelling #visualisation
Document changes: modeling, detection, storage and visualization (DChanges 2014) (GB, UMB, ADI, SM, EVM), pp. 207–208.
DocEngDocEng-2014-DohrnR #documentation #fine-grained
Fine-grained change detection in structured text documents (HD, DR), pp. 87–96.
DocEngDocEng-2014-FerilliGRE #order
Abstract argumentation for reading order detection (SF, DG, DR, FE), pp. 45–48.
HTHT-2014-HerzigMR #social #social media #topic
An author-reader influence model for detecting topic-based influencers in social media (JH, YM, HR), pp. 46–55.
JCDLJCDL-2014-KoopmanW #similarity #what
Where should I publish? Detecting journal similarity based on what have been published there (RK, SW), pp. 483–484.
JCDLJCDL-2014-MeuschkeG #retrieval #using
Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space (NM, BG), pp. 197–200.
JCDLJCDL-2014-SmithCDSW #modelling #reuse
Detecting and modeling local text reuse (DAS, RC, EMD, NS, JW), pp. 183–192.
SIGMODSIGMOD-2014-Dev #algorithm #community #interactive #network #online #social
A user interaction based community detection algorithm for online social networks (HD), pp. 1607–1608.
SIGMODSIGMOD-2014-Dev14a #community #graph #precise #privacy #social
Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
SIGMODSIGMOD-2014-ShaoCC #parallel #performance
Efficient cohesive subgraphs detection in parallel (YS, LC, BC), pp. 613–624.
VLDBVLDB-2014-ChenNC #performance #sql
Fast Foreign-Key Detection in Microsoft SQL Server PowerPivot for Excel (ZC, VRN, SC), pp. 1417–1428.
VLDBVLDB-2014-GuptaSGGZLL #graph #online #realtime #recommendation #scalability #twitter
Real-Time Twitter Recommendation: Online Motif Detection in Large Dynamic Graphs (PG, VS, AG, SG, VZ, QL, JL), pp. 1379–1380.
VLDBVLDB-2014-LondheGZNS #community
Matching Titles with Cross Title Web-Search Enrichment and Community Detection (NL, VG, AZ, HQN, RKS), pp. 1167–1178.
VLDBVLDB-2014-YuYWLC #big data #classification #design #power management
Big Data Small Footprint: The Design of A Low-Power Classifier for Detecting Transportation Modes (MCY, TY, SCW, CJL, EYC), pp. 1429–1440.
EDMEDM-2014-BakerO #effectiveness #scalability
Cost-Effective, Actionable Engagement Detection at Scale (RSB, JO), pp. 345–346.
EDMEDM-2014-NiznanPR #problem #using
Using Problem Solving Times and Expert Opinion to Detect Skills (JN, RP, JR), pp. 433–434.
EDMEDM-2014-PaquetteCBO #case study #game studies #process #re-engineering
Reengineering the Feature Distillation Process: A case study in detection of Gaming the System (LP, AMJBdC, RSB, JO), pp. 284–287.
EDMEDM-2014-PeroH #how #programming #question #source code #student
How patterns in source codes of students can help in detection of their programming skills? (SP, TH), pp. 371–372.
EDMEDM-2014-RoweBAKH #automation #learning
Building Automated Detectors of Gameplay Strategies to Measure Implicit Science Learning (ER, RSB, JAC, EK, WJH), pp. 337–338.
EDMEDM-2014-Schneider #collaboration #learning #multimodal #towards
Toward Collaboration Sensing: Multimodal Detection of the Chameleon Effect in Collaborative Learning Settings (BS), pp. 435–437.
EDMEDM-2014-ToussaintLT #automation #behaviour #similarity #towards #using
Towards Using Similarity Measure for Automatic Detection of Significant Behaviors from Continuous Data (BMT, VL, JT), pp. 427–428.
EDMEDM-2014-WixonAMBRW #scalability
The Opportunities and Limitations of Scaling Up Sensor-Free Affect Detection (MW, IA, KM, WB, DR, BPW), pp. 145–152.
SIGITESIGITE-2014-IhantolaSV #automation #programming
Automatically detectable indicators of programming assignment difficulty (PI, JS, AV), pp. 33–38.
SANERCSMR-WCRE-2014-DingZT #branch
Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
SANERCSMR-WCRE-2014-MondalRS14a
Improving the detection accuracy of evolutionary coupling by measuring change correspondence (MM, CKR, KAS), pp. 358–362.
SANERCSMR-WCRE-2014-UjhelyiHVCSVF #comparison #query
Anti-pattern detection with model queries: A comparison of approaches (ZU, ÁH, DV, NIC, GS, LV, RF), pp. 293–302.
SANERCSMR-WCRE-2014-VidacsBTSG #approach #fault #locality #reduction #testing
Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
ICPCICPC-2014-TianZLFZY #parallel #thread
Plagiarism detection for multithreaded software based on thread-aware software birthmarks (ZT, QZ, TL, MF, XZ, ZY), pp. 304–313.
ICSMEICSME-2014-AbreuCFMPS14a #fault #locality #smell
FaultySheet Detective: When Smells Meet Fault Localization (RA, JC, JPF, PM, AP, JS), pp. 625–628.
ICSMEICSME-2014-BauerVJ #approach #novel
A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
ICSMEICSME-2014-Kumar #collaboration #source code
Detecting Collaborative Patterns in Programs (KK), p. 664.
ICSMEICSME-2014-Palma #specification
Specification and Detection of SOA Antipatterns (FP), p. 670.
ICSMEICSME-2014-PonzanelliMBLF #quality #stack overflow
Improving Low Quality Stack Overflow Post Detection (LP, AM, AB, ML, DF), pp. 541–544.
ICSMEICSME-2014-Stephan #analysis #clone detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-SvajlenkoR #clone detection #tool support
Evaluating Modern Clone Detection Tools (JS, CKR), pp. 321–330.
MSRMSR-2014-KleinCK #debugging
New features for duplicate bug detection (NK, CSC, NAK), pp. 324–327.
MSRMSR-2014-LazarRS #debugging #metric #similarity #using
Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAMSCAM-2014-MurtazaHKC #automation
Total ADS: Automated Software Anomaly Detection System (SSM, AHL, WK, MC), pp. 83–88.
SEFMSEFM-2014-AlrajehC #automation #composition #specification
Automated Error-Detection and Repair for Compositional Software Specifications (DA, RC), pp. 111–127.
SEFMSEFM-2014-ChristakisMW #invariant #testing
Synthesizing Parameterized Unit Tests to Detect Object Invariant Violations (MC, PM, VW), pp. 65–80.
SFMSFM-2014-GiachinoL #concurrent #linear #recursion #source code
Deadlock Detection in Linear Recursive Programs (EG, CL), pp. 26–64.
CHICHI-2014-HautasaariYG #communication #quote
“Maybe it was a joke”: emotion detection in text-only communication by non-native english speakers (AMJH, NY, GG), pp. 3715–3724.
CHICHI-2014-MinDWAZH #named #quality #smarttech
Toss-n-turn: smartphone as sleep and sleep quality detector (JKM, AD, JW, SA, JZ, JIH), pp. 477–486.
CHICHI-2014-SunPC #named
MouStress: detecting stress from mouse motion (DS, PP, JC), pp. 61–70.
HCIDUXU-DI-2014-Al-SalhieAA #multi
Multimedia Surveillance in Event Detection: Crowd Analytics in Hajj (LAS, MAZ, AAW), pp. 383–392.
HCIDUXU-DI-2014-GencerBZV #machine learning #mobile
Detection of Churned and Retained Users with Machine Learning Methods for Mobile Applications (MG, GB, ÖZ, TV), pp. 234–245.
HCIDUXU-DI-2014-HeZL #fault #feature model #image #segmentation
Aluminum CT Image Defect Detection Based on Segmentation and Feature Extraction (NH, LZ, KL), pp. 446–454.
HCIHCI-AIMT-2014-HottaHOK #estimation #fault #multi
Detecting Address Estimation Errors from Users’ Reactions in Multi-user Agent Conversation (RH, HHH, SO, KK), pp. 245–253.
HCIHCI-AIMT-2014-RoyC #artificial reality #invariant #markov #using
View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCIHCI-AIMT-2014-TewsOFK #interface #research
Current and New Research Perspectives on Dynamic Facial Emotion Detection in Emotional Interface (TKT, MO, HF, TK), pp. 779–787.
HCILCT-TRE-2014-YamaguchiSYNSM #collaboration #distance #learning
Posture and Face Detection with Dynamic Thumbnail Views for Collaborative Distance Learning (TY, HS, MY, YN, HS, TM), pp. 227–236.
HCISCSM-2014-Ahangama #realtime #social #social media #twitter #using
Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
HCISCSM-2014-Kanawati #community #network
Seed-Centric Approaches for Community Detection in Complex Networks (RK), pp. 197–208.
CAiSECAiSE-2014-PadilhaPFAGS #effectiveness #empirical #metric #on the #smell
On the Effectiveness of Concern Metrics to Detect Code Smells: An Empirical Study (JP, JAP, EF, JMA, AG, CS), pp. 656–671.
ICEISICEIS-v1-2014-Lenz
Data Fraud Detection (HJL), p. XV.
ICEISICEIS-v1-2014-MezghaniPZAS #social
Analyzing Tagged Resources for Social Interests Detection (MM, AP, CAZ, IA, FS), pp. 340–345.
ICEISICEIS-v1-2014-SilvaNMFMM #algorithm #distributed #performance #pipes and filters #using
Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEISICEIS-v2-2014-GippMBPN #semantics #similarity #using #visualisation
Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEISICEIS-v2-2014-JulianoTS #metric #object-oriented #using
Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEISICEIS-v2-2014-ThorntonCPHM #health
Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data (DT, GvC, MP, JvH, RMM), pp. 684–694.
CIKMCIKM-2014-AnchuriSS #architecture
Hotspot Detection in a Service-Oriented Architecture (PA, RS, SS), pp. 1749–1758.
CIKMCIKM-2014-KiselevaCBD #modelling #user satisfaction
Modelling and Detecting Changes in User Satisfaction (JK, EC, RB, RD), pp. 1449–1458.
CIKMCIKM-2014-LefortierSR #online
Online Exploration for Detecting Shifts in Fresh Intent (DL, PS, MdR), pp. 589–598.
CIKMCIKM-2014-OuyangSTN #crowdsourcing
Truth Discovery in Crowdsourced Detection of Spatial Events (WRO, MBS, AT, TJN), pp. 461–470.
CIKMCIKM-2014-ShihKRCGSP #component #network
Component Detection in Directed Networks (YKS, SK, YR, JC, AG, TS, SP), pp. 1729–1738.
CIKMCIKM-2014-ShuLLYT
Deal or deceit: detecting cheating in distribution channels (KS, PL, WL, PY, LT), pp. 1419–1428.
CIKMCIKM-2014-TakayamaTIOFC #probability
A Word-Scale Probabilistic Latent Variable Model for Detecting Human Values (YT, YT, EI, DWO, KRF, ASC), pp. 1489–1498.
CIKMCIKM-2014-TangWPTL #approach
An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
CIKMCIKM-2014-WangWC #community #named #network #social
CoDEM: An Ingenious Tool of Insight into Community Detection in Social Networks (MW, CW, JC), pp. 2006–2008.
CIKMCIKM-2014-YangLLLH #automation #clustering #multi #social #using
Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
ECIRECIR-2014-CorneyMG #twitter
Spot the Ball: Detecting Sports Events on Twitter (DC, CJM, AG), pp. 449–454.
ECIRECIR-2014-GalleR
Boilerplate Detection and Recoding (MG, JMR), pp. 462–467.
ECIRECIR-2014-PanemBGV #realtime #topic #twitter #using
Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIRECIR-2014-SchallerHE #smarttech
Detecting Event Visits in Urban Areas via Smartphone GPS Data (RS, MH, DE), pp. 681–686.
ECIRECIR-2014-ThumaRO #query #retrieval
Detecting Missing Content Queries in an SMS-Based HIV/AIDS FAQ Retrieval System (ET, SR, IO), pp. 247–259.
ICMLICML-c1-2014-ChenSMKWK #adaptation
Active Detection via Adaptive Submodularity (YC, HS, CFM, LPK, SW, AK), pp. 55–63.
ICMLICML-c2-2014-AhmedTBZDKB #random
Hierarchical Conditional Random Fields for Outlier Detection: An Application to Detecting Epileptogenic Cortical Malformations (BA, TT, KB, YZ, OD, RK, CEB), pp. 1080–1088.
ICMLICML-c2-2014-HarelMEC #concept
Concept Drift Detection Through Resampling (MH, SM, REY, KC), pp. 1009–1017.
ICPRICPR-2014-0005ZTS #segmentation
Human Hair Segmentation and Length Detection for Human Appearance Model (YW, ZZ, EKT, BS), pp. 450–454.
ICPRICPR-2014-AkinM #learning #online
Online Learning and Detection with Part-Based, Circulant Structure (OA, KM), pp. 4229–4233.
ICPRICPR-2014-AlyuzGA #3d #recognition #robust
Detection of Realistic Facial Occlusions for Robust 3D Face Recognition (NA, BG, LA), pp. 375–380.
ICPRICPR-2014-BalntasTM
Improving Object Tracking with Voting from False Positive Detections (VB, LT, KM), pp. 1928–1933.
ICPRICPR-2014-BartoliLKBB #adaptation #multi #performance
Unsupervised Scene Adaptation for Faster Multi-scale Pedestrian Detection (FB, GL, SK, ADB, ADB), pp. 3534–3539.
ICPRICPR-2014-BayramogluKEANKH #approach #image #machine learning #using
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BiswasZLMV #analysis #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-BougueliaBB #classification #data type #novel #performance
Efficient Active Novel Class Detection for Data Stream Classification (MRB, YB, AB), pp. 2826–2831.
ICPRICPR-2014-BrownFP #self #using
Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPRICPR-2014-BuiNLYK #order #statistics #using
Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPRICPR-2014-CechFM #3d #approach #refinement
A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
ICPRICPR-2014-ChenH #composition
Implicit Rank-Sparsity Decomposition: Applications to Saliency/Co-saliency Detection (YLC, CTH), pp. 2305–2310.
ICPRICPR-2014-ChenLHLLH #using
Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPRICPR-2014-ChenLLYH #adaptation #forensics
Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement (CC, HL, WL, RY, JH), pp. 672–677.
ICPRICPR-2014-ChenSPS #energy #statistics
Statistical Anomaly Detection in Mean and Variation of Energy Consumption (BC, MS, JP, AS), pp. 3570–3575.
ICPRICPR-2014-ChenWCN #fault #modelling #network
Confusion Network Based Recurrent Neural Network Language Modeling for Chinese OCR Error Detection (JC, YW, HC, PN), pp. 1266–1271.
ICPRICPR-2014-Climent-PerezMR #multi #using
Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPRICPR-2014-ContiFAAMCT #distance #evaluation
Evaluation of Time Series Distance Functions in the Task of Detecting Remote Phenology Patterns (JCC, FAF, JA, BA, LPCM, LC, RdST), pp. 3126–3131.
ICPRICPR-2014-DingM #approach #image
An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
ICPRICPR-2014-ElmikatyS #image #multi #using
Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPRICPR-2014-FerisBPS
Appearance-Based Object Detection Under Varying Environmental Conditions (RF, LMGB, SP, MTS), pp. 166–171.
ICPRICPR-2014-FiratCV #learning #representation
Representation Learning for Contextual Object and Region Detection in Remote Sensing (OF, GC, FTYV), pp. 3708–3713.
ICPRICPR-2014-FradiD #recognition
Sparse Feature Tracking for Crowd Change Detection and Event Recognition (HF, JLD), pp. 4116–4121.
ICPRICPR-2014-FrucciGNRB #mobile #named
IDEM: Iris DEtection on Mobile Devices (MF, CG, MN, DR, GSdB), pp. 1752–1757.
ICPRICPR-2014-FuGYGY #graph
Graph Construction for Salient Object Detection in Videos (KF, IYHG, YY, CG, JY), pp. 2371–2376.
ICPRICPR-2014-GomezK #realtime
MSER-Based Real-Time Text Detection and Tracking (LG, DK), pp. 3110–3115.
ICPRICPR-2014-HedjamCK #documentation #energy #image #multi #self
Constrained Energy Maximization and Self-Referencing Method for Invisible Ink Detection from Multispectral Historical Document Images (RH, MC, MK), pp. 3026–3031.
ICPRICPR-2014-HtikeH #adaptation #performance #video
Efficient Non-iterative Domain Adaptation of Pedestrian Detectors to Video Scenes (KKH, DCH), pp. 654–659.
ICPRICPR-2014-HuWSC #framework #robust #using
Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPRICPR-2014-JhuoL #learning #multi #video
Video Event Detection via Multi-modality Deep Learning (IHJ, DTL), pp. 666–671.
ICPRICPR-2014-KamberovBKK #video
Unsupervised Detection of Video Sub-scenes (GK, MB, LK, OK), pp. 1934–1939.
ICPRICPR-2014-KawarabukiO
Snowfall Detection in a Foggy Scene (HK, KO), pp. 877–882.
ICPRICPR-2014-LablackDBD #approach
A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
ICPRICPR-2014-LemesSBS #authentication
Dynamic Pore Filtering for Keypoint Detection Applied to Newborn Authentication (RdPL, MPS, ORPB, LS), pp. 1698–1703.
ICPRICPR-2014-LiangLLFL #modelling
Accurate Facial Landmarks Detection for Frontal Faces with Extended Tree-Structured Models (AL, WL, LL, MRF, VL), pp. 538–543.
ICPRICPR-2014-LiewY #feature model #novel #performance #robust
Generalized BRIEF: A Novel Fast Feature Extraction Method for Robust Hand Detection (CFL, TY), pp. 3014–3019.
ICPRICPR-2014-LimKLC #similarity
Crowd Saliency Detection via Global Similarity Structure (MKL, VJK, CCL, CSC), pp. 3957–3962.
ICPRICPR-2014-LinCCLH #analysis
Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPRICPR-2014-LiuCL #segmentation
Exploring Depth Information for Object Segmentation and Detection (TLL, KYC, SHL), pp. 4340–4345.
ICPRICPR-2014-LiuZZL #realtime
Real-Time Scene Text Detection Based on Stroke Model (YL, DZ, YZ, SL), pp. 3116–3120.
ICPRICPR-2014-LuWMST #modelling
Anomaly Detection through Spatio-temporal Context Modeling in Crowded Scenes (TL, LW, XM, PS, CLT), pp. 2203–2208.
ICPRICPR-2014-LuWW #summary
Audiotory Movie Summarization by Detecting Scene Changes and Sound Events (TL, YW, GW), pp. 756–760.
ICPRICPR-2014-MaB #incremental #random
Compound Exemplar Based Object Detection by Incremental Random Forest (KM, JBA), pp. 2407–2412.
ICPRICPR-2014-MatsuoSY #image #using
Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPRICPR-2014-MatveevG #approximate #segmentation
Iris Segmentation System Based on Approximate Feature Detection with Subsequent Refinements (IM, KG), pp. 1704–1709.
ICPRICPR-2014-MekonnenLHB #optimisation #people
People Detection with Heterogeneous Features and Explicit Optimization on Computation Time (AAM, FL, AH, CB), pp. 4322–4327.
ICPRICPR-2014-MeloLMS #approach
An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
ICPRICPR-2014-MolderCCH #automation #reduction #using
Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPRICPR-2014-MoriKNK #using #video
Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPRICPR-2014-MuddamsettySTM #using
Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPRICPR-2014-NilssonAGF #using
Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPRICPR-2014-NilufarP #learning #programming
Learning to Detect Contours with Dynamic Programming Snakes (SN, TJP), pp. 984–989.
ICPRICPR-2014-OzkanEA #video #visual notation
Visual Group Binary Signature for Video Copy Detection (, EE, GBA), pp. 3945–3950.
ICPRICPR-2014-PakKA #probability
Improvement of Benign and Malignant Probability Detection Based on Non-subsample Contourlet Transform and Super-resolution (FP, HRK, AA), pp. 895–899.
ICPRICPR-2014-PanagiotakisK #automation #fault
Automatic Enhancement and Detection of Active Sea Faults from Bathymetry (CP, EK), pp. 855–860.
ICPRICPR-2014-PedagadiOB
Integral Line Scan Features for Pedestrian Detection (SP, JO, BAB), pp. 2383–2388.
ICPRICPR-2014-PistocchiCBFC #3d #classification #kernel
Kernelized Structural Classification for 3D Dogs Body Parts Detection (SP, SC, SB, NF, RC), pp. 1993–1998.
ICPRICPR-2014-RahmanHZ
Information Divergence Based Saliency Detection with a Global Center-Surround Mechanism (IMHR, CH, MZ), pp. 3428–3433.
ICPRICPR-2014-RamirezOT #multi
Go with the Flow: Improving Multi-view Vehicle Detection with Motion Cues (AR, EOB, MMT), pp. 4140–4145.
ICPRICPR-2014-RazakarivonyJ
Discriminative Autoencoders for Small Targets Detection (SR, FJ), pp. 3528–3533.
ICPRICPR-2014-RiabchenkoKC14a
Density-Aware Part-Based Object Detection with Positive Examples (ER, JKK, KC), pp. 2814–2819.
ICPRICPR-2014-SantoshWAT #image #scalability
Scalable Arrow Detection in Biomedical Images (KCS, LW, SA, GRT), pp. 3257–3262.
ICPRICPR-2014-SariE #analysis #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SchubertM #robust
Robust Registration and Filtering for Moving Object Detection in Aerial Videos (FS, KM), pp. 2808–2813.
ICPRICPR-2014-SinghKZ #difference #image #markov #multi #scalability
A Multilayer Markovian Model for Change Detection in Aerial Image Pairs with Large Time Differences (PS, ZK, JZ), pp. 924–929.
ICPRICPR-2014-SmedtBTG #combinator #multi
The Combinator: Optimal Combination of Multiple Pedestrian Detectors (FDS, KVB, TT, TG), pp. 3522–3527.
ICPRICPR-2014-SongSLZZC #image
Corner Detection in Images Under Different Noise Levels (YS, YS, SL, CZ, JZ, HC), pp. 906–911.
ICPRICPR-2014-SuL
High-Stakes Deception Detection Based on Facial Expressions (LS, MDL), pp. 2519–2524.
ICPRICPR-2014-SunHJC #image #network #robust
Robust Text Detection in Natural Scene Images by Generalized Color-Enhanced Contrasting Extremal Region and Neural Networks (LS, QH, WJ, KC), pp. 2715–2720.
ICPRICPR-2014-SunZL #adaptation
An Adaptive-Profile Active Shape Model for Facial-Feature Detection (KS, HZ, KML), pp. 2849–2854.
ICPRICPR-2014-TaniH #robust #using
Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPRICPR-2014-TavanaiSGCH
Context Aware Detection and Tracking (AT, MS, FG, AGC, DCH), pp. 2197–2202.
ICPRICPR-2014-TuXN #analysis #process
Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPRICPR-2014-UbukataSTMKMU #image #performance #segmentation
Fast Human Detection Combining Range Image Segmentation and Local Feature Based Detection (TU, MS, KT, AM, TK, GM, KU), pp. 4281–4286.
ICPRICPR-2014-WangFC
Traffic Camera Anomaly Detection (YKW, CTF, JFC), pp. 4642–4647.
ICPRICPR-2014-WangFH0KH #image #performance
Fast and Accurate Text Detection in Natural Scene Images with User-Intention (LW, WF, YH, JS, YK, YH), pp. 2920–2925.
ICPRICPR-2014-WangLSSC #evaluation
Evaluation of Feature Detectors and Descriptors for Motion Detection from Aerial Videos (CW, SL, YS, YS, HC), pp. 2596–2601.
ICPRICPR-2014-WuJ #learning
Learning the Deep Features for Eye Detection in Uncontrolled Conditions (YW, QJ), pp. 455–459.
ICPRICPR-2014-YunJKHC #modelling #performance #self
Self-Organizing Cascaded Structure of Deformable Part Models for Fast Object Detection (SY, HJ, WSK, BH, JYC), pp. 4246–4250.
ICPRICPR-2014-YunJYKC #interactive #video
Motion Interaction Field for Accident Detection in Traffic Surveillance Video (KY, HJ, KMY, SWK, JYC), pp. 3062–3067.
ICPRICPR-2014-YuSZ #artificial reality #image #realtime #sequence
Real Time Fingertip Detection with Kinect Depth Image Sequences (YY, YS, YZ), pp. 550–555.
ICPRICPR-2014-ZhangKBC
Center-Surround Contrast Features for Pedestrian Detection (SZ, DAK, CB, ABC), pp. 2293–2298.
ICPRICPR-2014-ZhangLYQWTZ #statistics
Sufficient Statistics Feature Mapping over Deep Boltzmann Machine for Detection (CZ, XL, JY, SQ, YW, CT, YZ), pp. 827–832.
ICPRICPR-2014-ZhangM #adaptation
Improving Object Tracking by Adapting Detectors (LZ, LvdM), pp. 1218–1223.
ICPRICPR-2014-ZhangM14a #learning #multi
Simultaneous Detection of Multiple Facial Action Units via Hierarchical Task Structure Learning (XZ, MHM), pp. 1863–1868.
KDDKDD-2014-BabaieCA #online
Sleep analytics and online selective anomaly detection (TB, SC, RGA), pp. 362–371.
KDDKDD-2014-ChenN #graph #parametricity #social #social media #statistics
Non-parametric scan statistics for event detection and forecasting in heterogeneous social media graphs (FC, DBN), pp. 1166–1175.
KDDKDD-2014-DuanSLL #community #correlation #graph
Community detection in graphs through correlation (LD, WNS, YL, HL), pp. 1376–1385.
KDDKDD-2014-FortunySMMPM
Corporate residence fraud detection (EJdF, MS, JM, BM, FJP, DM), pp. 1650–1659.
KDDKDD-2014-GunnemannGF #evolution #probability #rating #robust
Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution (SG, NG, CF), pp. 841–850.
KDDKDD-2014-KlosterG #community #kernel
Heat kernel based community detection (KK, DFG), pp. 1386–1395.
KDDKDD-2014-PerozziASM #clustering #graph #scalability
Focused clustering and outlier detection in large attributed graphs (BP, LA, PIS, EM), pp. 1346–1355.
KDDKDD-2014-RozenshteinAGT #network #process
Event detection in activity networks (PR, AA, AG, NT), pp. 1176–1185.
KDDKDD-2014-SchubertWK #named #scalability #topic
SigniTrend: scalable detection of emerging topics in textual streams by hashed significance thresholds (ES, MW, HPK), pp. 871–880.
KDDKDD-2014-TamersoyRC #graph #mining #scalability
Guilt by association: large scale malware detection by mining file-relation graphs (AT, KAR, DHC), pp. 1524–1533.
KDDKDD-2014-YuCRW
Detecting moving object outliers in massive-scale trajectory streams (YY, LC, EAR, QW), pp. 422–431.
KDDKDD-2014-YuH0 #analysis #named #social #social media
GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDIRKDIR-2014-NagwanshiM #semantics #sentiment #using
Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIRKDIR-2014-PassonneauRX #mining #scalability
Company Mention Detection for Large Scale Text Mining (RJP, TR, BX), pp. 512–520.
MLDMMLDM-2014-AndreaSVU #performance
A New Measure of Outlier Detection Performance (KA, GS, NV, AU), pp. 190–197.
MLDMMLDM-2014-KhasnabishSDS #learning #programming language #source code #using
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDMMLDM-2014-YuST #modelling #realtime
Semi-supervised Time Series Modeling for Real-Time Flux Domain Detection on Passive DNS Traffic (BY, LS, MT), pp. 258–271.
RecSysRecSys-2014-TavakolB #topic
Factored MDPs for detecting topics of user sessions (MT, UB), pp. 33–40.
SEKESEKE-2014-CostaMM #diagrams #equivalence #semantics #uml
Detecting Semantic Equivalence in UML Class Diagrams (VOC, RM, LM), pp. 318–323.
SEKESEKE-2014-LiuTA #database
Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
SEKESEKE-2014-Otunba0 #approximate #named
APT: Approximate Period Detection in Time Series (RO, JL), pp. 490–494.
SEKESEKE-2014-SantosM #identification
Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
SEKESEKE-2014-SolariM #empirical #fault #testing
A Controlled Experiment to Explore Potentially Undetectable Defects for Testing Techniques (MS, SM), pp. 106–109.
SIGIRSIGIR-2014-HuTL #microblog
Leveraging knowledge across media for spammer detection in microblogging (XH, JT, HL), pp. 547–556.
SIGIRSIGIR-2014-KumarJF #twitter #using
Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIRSIGIR-2014-ParkS #higher-order #modelling #probability
Second order probabilistic models for within-document novelty detection in academic articles (LAFP, SS), pp. 1103–1106.
SIGIRSIGIR-2014-SpinaGA #learning #monitoring #online #similarity #topic
Learning similarity functions for topic detection in online reputation monitoring (DS, JG, EA), pp. 527–536.
SIGIRSIGIR-2014-ZhangKQH #semantics #word
Continuous word embeddings for detecting local text reuses at the semantic level (QZ, JK, JQ, XH), pp. 797–806.
SIGIRSIGIR-2014-ZhouKWAD #recommendation
Detection of abnormal profiles on group attacks in recommender systems (WZ, YSK, JW, SA, GD), pp. 955–958.
MODELSMoDELS-2014-ChavarriagaNCJ #multi #process
Propagating Decisions to Detect and Explain Conflicts in a Multi-step Configuration Process (JC, CN, RC, VJ), pp. 337–352.
OOPSLAOOPSLA-2014-SamakR #concurrent #parallel #synthesis #thread
Multithreaded test synthesis for deadlock detection (MS, MKR), pp. 473–489.
PLATEAUPLATEAU-2014-SadowskiY #concurrent #developer #how #tool support
How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
LOPSTRLOPSTR-2014-SinghK #java #partial evaluation
Partial Evaluation for Java Malware Detection (RS, AK), pp. 133–147.
PEPMPEPM-2014-0008E #c++ #fault
Early detection of type errors in C++ templates (SC, ME), pp. 133–144.
PLDIPLDI-2014-DimitrovRVK #commutative #concurrent
Commutativity race detection (DD, VR, MTV, EK), p. 33.
PLDIPLDI-2014-HsiaoPYPNCKF #concurrent #mobile
Race detection for event-driven mobile applications (CHH, CP, JY, GP, SN, PMC, ZK, JF), p. 35.
PLDIPLDI-2014-HuangMR #abstraction #concurrent #control flow #predict
Maximal sound predictive race detection with control flow abstraction (JH, POM, GR), p. 36.
PLDIPLDI-2014-MaiyaKM #android #concurrent
Race detection for Android applications (PM, AK, RM), p. 34.
PLDIPLDI-2014-TavarageriKS #fault #memory management
Compiler-assisted detection of transient memory errors (ST, SK, PS), p. 24.
RERE-2014-AdedjoumaSB #approach #automation #case study
Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
ASEASE-2014-LiuSLZWDW #automation #case study #documentation #fault
Automatic early defects detection in use case documents (SL, JS, YL, YZ, BW, JSD, XW), pp. 785–790.
ASEASE-2014-ThungKL #debugging #named #tool support
DupFinder: integrated tool support for duplicate bug report detection (FT, PSK, DL), pp. 871–874.
FSEFSE-2014-BaeCLR #api #named #web
SAFEWAPI: web API misuse detector for web applications (SB, HC, IL, SR), pp. 507–517.
FSEFSE-2014-BanerjeeC0R #debugging #energy #mobile
Detecting energy bugs and hotspots in mobile apps (AB, LKC, SC, AR), pp. 588–598.
FSEFSE-2014-Bell #dependence #testing
Detecting, isolating, and enforcing dependencies among and within test cases (JB), pp. 799–802.
FSEFSE-2014-EslamimehrP #concurrent #named #scalability #source code
Sherlock: scalable deadlock detection for concurrent programs (ME, JP), pp. 353–365.
FSEFSE-2014-FengADA #android #named #semantics #static analysis
Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
FSEFSE-2014-HuoC #quality #testing
Improving oracle quality by detecting brittle assertions and unused inputs in tests (CH, JC), pp. 621–631.
FSEFSE-2014-Kasi #scheduling
Minimizing software conflicts through proactive detection of conflicts and task scheduling (BKK), pp. 807–810.
FSEFSE-2014-LuoMW0Z #comparison #obfuscation #semantics #similarity
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
FSEFSE-2014-MileaJK #abstraction #refactoring #scalability
Vector abstraction and concretization for scalable detection of refactorings (NAM, LJ, SCK), pp. 86–97.
FSEFSE-2014-MirakhorliFGWC #architecture #monitoring #named
Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
FSEFSE-2014-SamakR #concurrent #java #library #parallel #precise #thread
Omen+: a precise dynamic deadlock detector for multithreaded Java libraries (MS, MKR), pp. 735–738.
FSEFSE-2014-Xiao #architecture #debugging
Detecting and preventing the architectural roots of bugs (LX), pp. 811–813.
ICSEICSE-2014-ChenLZ #android #scalability
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets (KC, PL, YZ), pp. 175–186.
ICSEICSE-2014-ChenSJHNF #anti #performance #using
Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSEICSE-2014-DouCW #ambiguity #smell #spreadsheet
Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computation (WD, SCC, JW), pp. 848–858.
ICSEICSE-2014-HuangZTWL #android #behaviour #named #user interface
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
ICSEICSE-2014-JungLRP #automation #memory management
Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
ICSEICSE-2014-LeeJP #behaviour #machine learning #memory management #modelling #using
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSEICSE-2014-LinXXLPSZ #difference #multi
Detecting differences across multiple instances of code clones (YL, ZX, YX, YL, XP, JS, WZ), pp. 164–174.
ICSEICSE-2014-LiuXC #debugging #performance #smarttech
Characterizing and detecting performance bugs for smartphone applications (YL, CX, SCC), pp. 1013–1024.
ICSEICSE-2014-NegaraCDJ #fine-grained #mining
Mining fine-grained code changes to detect unknown change patterns (SN, MC, DD, REJ), pp. 803–813.
SACSAC-2014-ChenLFCCK #algorithm #design #effectiveness #health #implementation #monitoring
Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology (HC, GTL, YCF, BCC, CMC, TCK), pp. 33–35.
SACSAC-2014-ChenZW #named #testing
Crashmaker: an improved binary concolic testing tool for vulnerability detection (BC, QZ, WW), pp. 1257–1263.
SACSAC-2014-Cooper #android #research #student
Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
SACSAC-2014-FerreiraBBAG #architecture #case study #effectiveness
Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
SACSAC-2014-FreitasVHBV #twitter
Pathways for irony detection in tweets (LAdF, AAV, DNH, MNB, RV), pp. 628–633.
SACSAC-2014-IencoBPP #category theory #data type #evolution
Change detection in categorical evolving data streams (DI, AB, BP, PP), pp. 792–797.
SACSAC-2014-JunAK #using
DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SACSAC-2014-KawsarAL #multimodal #process #smarttech #using
Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SACSAC-2014-KimK #community #mobile #network #social
A detection of overlapping community in mobile social network (PK, SK), pp. 175–179.
SACSAC-2014-MazelFF #comparison #diagrams #network #visual notation
Visual comparison of network anomaly detectors with chord diagrams (JM, RF, KF), pp. 473–480.
SACSAC-2014-NabeezathP #algorithm #performance
Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
SACSAC-2014-PalVCS #smarttech #using
Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SACSAC-2014-PengYYHKH #3d #multi #using
3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SACSAC-2014-ZandVYK
Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
ASPLOSASPLOS-2014-WoodCG #low level
Low-level detection of language-level data races with LARD (BPW, LC, DG), pp. 671–686.
ASPLOSASPLOS-2014-ZhangRZGBXZ #correlation #named
EnCore: exploiting system environment and correlation information for misconfiguration detection (JZ, LR, XZ, NG, VB, TX, YZ), pp. 687–700.
CASECASE-2014-CanaliCCSEC #assembly #automation #industrial
An automatic assembly parts detection and grasping system for industrial manufacturing (CC, FC, FC, GS, AE, DGC), pp. 215–220.
CASECASE-2014-CaoMDZ #performance #visual notation
A gabor based fast interest point detector for image-based robot visual servo control (ZC, FM, JSD, JZ), pp. 883–888.
CASECASE-2014-ChiuC #bound #image
A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
CASECASE-2014-KuoSLW #3d #estimation #image
3D object detection and pose estimation from depth image for robotic bin picking (HYK, HRS, SHL, CCW), pp. 1264–1269.
CASECASE-2014-YuM #approach #data-driven #statistics
Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
CGOCGO-2014-SureshS #algorithm #automation #fault #grid #problem
Automated Algorithmic Error Resilience for Structured Grid Problems Based on Outlier Detection (AS, JS), p. 240.
CGOCGO-2014-YanXYR #memory management #named
LeakChecker: Practical Static Memory Leak Detection for Managed Languages (DY, G(X, SY, AR), p. 87.
CGOCGO-2014-YeSX #analysis
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
DACDAC-2014-CuiMSW #hardware #runtime #synthesis
High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery (XC, KM, LS, KW), p. 6.
DACDAC-2014-HernandezA #fault #named #safety
LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
DACDAC-2014-LiuHM #hardware #statistics
Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting (YL, KH, YM), p. 6.
DACDAC-2014-RaiHST #fault #framework #performance #realtime
An Efficient Real Time Fault Detection and Tolerance Framework Validated on the Intel SCC Processor (DR, PH, NS, LT), p. 6.
DACDAC-2014-VaidyanathanDP #reliability #stack #using
Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DACDAC-2014-XiaCK #algorithm #automation #development
An Automobile Detection Algorithm Development for Automated Emergency Braking System (LX, TDC, KAAK), p. 6.
DATEDATE-2014-AndradesRC #design
Signature indexing of design layouts for hotspot detection (CA, MAR, CCC), pp. 1–6.
DATEDATE-2014-BardizbanyanSWL #data flow #dependence #energy
Reducing set-associative L1 data cache energy by early load data dependence detection (ELD3) (AB, MS, DBW, PLE), pp. 1–4.
DATEDATE-2014-Fu0PJZ #data flow #fault #parallel #thread
A fault detection mechanism in a Data-flow scheduled Multithreaded processor (JF, QY, RP, CRJ, CZ), pp. 1–4.
DATEDATE-2014-JunsangsriLH #concurrent #hybrid
A hybrid non-volatile SRAM cell with concurrent SEU detection and correction (PJ, FL, JH), pp. 1–4.
DATEDATE-2014-KordesVDW #fault #hybrid #network #robust
Startup error detection and containment to improve the robustness of hybrid FlexRay networks (AK, BV, AKD, MGW), pp. 1–6.
DATEDATE-2014-Maurer #algorithm #symmetry
A universal symmetry detection algorithm (PMM), pp. 1–4.
DATEDATE-2014-MurilloWCLA #automation #concurrent #constraints #debugging
Automatic detection of concurrency bugs through event ordering constraints (LGM, SW, JC, RL, GA), pp. 1–6.
DATEDATE-2014-NathanS #fault #low cost #named
Nostradamus: Low-cost hardware-only error detection for processor cores (RN, DJS), pp. 1–6.
DATEDATE-2014-ZussaDTDMGCT #fault #injection #performance
Efficiency of a glitch detector against electromagnetic fault injection (LZ, AD, KT, JMD, PM, LGS, JC, AT), pp. 1–6.
HPCAHPCA-2014-HuangHFS #concurrent #data transformation #metadata #runtime
Low-overhead and high coverage run-time race detection through selective meta-data management (RCH, EH, AF, GES), pp. 96–107.
HPCAHPCA-2014-QiMAT
Dynamically detecting and tolerating IF-Condition Data Races (SQ, AM, WA, JT), pp. 120–131.
OSDIOSDI-2014-ChenMXHPSZ
Detecting Covert Timing Channels with Time-Deterministic Replay (AC, WBM, HX, AH, LTXP, MS, WZ), pp. 541–554.
PDPPDP-2014-YalcinSHVWFUCF #energy #fault #memory management #transaction
Combining Error Detection and Transactional Memory for Energy-Efficient Computing below Safe Operation Margins (GY, AS, DH, AV, JTW, PF, OSÜ, AC, CF), pp. 248–255.
PPoPPPPoPP-2014-Bautista-GomezC #monitoring
Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
PPoPPPPoPP-2014-LiuTHB #named #predict
PREDATOR: predictive false sharing detection (TL, CT, ZH, EDB), pp. 3–14.
PPoPPPPoPP-2014-SamakR #concurrent
Trace driven dynamic deadlock detection and reproduction (MS, MKR), pp. 29–42.
STOCSTOC-2014-Massoulie #community
Community detection thresholds and the weak Ramanujan property (LM), pp. 694–703.
TACASTACAS-2014-BozzanoCGT #component #design #fault #identification #logic #using
Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACASTACAS-2014-FinkbeinerT #distributed #specification
Detecting Unrealizable Specifications of Distributed Systems (BF, LT), pp. 78–92.
ICSTICST-2014-HongPK #concurrent #fault #java #web
Detecting Concurrency Errors in Client-Side Java Script Web Applications (SH, YP, MK), pp. 61–70.
ICTSSICTSS-2014-Bures #automation #maintenance #testing
Change Detection System for the Maintenance of Automated Testing (MB), pp. 192–197.
ISSTAISSTA-2014-AlshahwanH #fault #testing
Coverage and fault detection of the output-uniqueness test selection criteria (NA, MH), pp. 181–192.
ISSTAISSTA-2014-ChoudharyPO14a #consistency #named #nondeterminism #testing #web
X-PERT: a web application testing tool for cross-browser inconsistency detection (SRC, MRP, AO), pp. 417–420.
ISSTAISSTA-2014-MileaJK #refactoring #scalability
Scalable detection of missed cross-function refactorings (NAM, LJ, SCK), pp. 138–148.
ISSTAISSTA-2014-ZhangC #automation #exception #information management #lightweight
Lightweight automated detection of unsafe information leakage via exceptions (BZ, JC), pp. 327–338.
ICSTSAT-2014-BiereBLM #constraints
Detecting Cardinality Constraints in CNF (AB, DLB, EL, NM), pp. 285–301.
DocEngDocEng-2013-BarabucciBIM #documentation #modelling #visualisation
Document changes: modeling; detection; storing and visualization (DChanges) (GB, UMB, ADI, SM), pp. 281–282.
DocEngDocEng-2013-NevesZM #adaptation #algorithm #documentation #image
An adaptive thresholding algorithm based on edge detection and morphological operations for document images (RFdPN, CZ, CABM), pp. 107–110.
DocEngDocEng-2013-WilliamsG #library
Near duplicate detection in an academic digital library (KW, CLG), pp. 91–94.
DRRDRR-2013-LiWTL #comprehension #image
Comic image understanding based on polygon detection (LL, YW, ZT, DL).
DRRDRR-2013-RazaAS #image #multi
Multilingual artificial text detection and extraction from still images (AR, AA, IS).
DRRDRR-2013-SalahRP #adaptation #assessment #automation #quality
Adaptive detection of missed text areas in OCR outputs: application to the automatic assessment of OCR quality in mass digitization projects (ABS, NR, TP).
HTHT-2013-JarukasemratanaML #algorithm #community #distance #network
Community detection algorithm based on centrality and node distance in scale-free networks (SJ, TM, XL), pp. 258–262.
ICDARICDAR-2013-AlaeiDG #probability #representation #using
Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDARICDAR-2013-BertrandGTFO #documentation
A System Based on Intrinsic Features for Fraudulent Document Detection (RB, PGK, ORT, PF, JMO), pp. 106–110.
ICDARICDAR-2013-ChenPCN
Detecting OOV Names in Arabic Handwritten Data (JC, RP, HC, PN), pp. 994–998.
ICDARICDAR-2013-DiamantatosVK #documentation #image
Detecting Main Body Size in Document Images (DP, VV, EK), pp. 1160–1164.
ICDARICDAR-2013-DiemKS #documentation
Text Line Detection for Heterogeneous Documents (MD, FK, RS), pp. 743–747.
ICDARICDAR-2013-FernandezT #algorithm
Handwritten Line Detection via an EM Algorithm (FCF, ORT), pp. 718–722.
ICDARICDAR-2013-GandhiJ #documentation #image
Detection of Cut-and-Paste in Document Images (AG, CVJ), pp. 653–657.
ICDARICDAR-2013-GaoRKLSIK #documentation #image #retrieval
Key-Region Detection for Document Images — Application to Administrative Document Retrieval (HG, MR, DK, JL, TS, MI, KK), pp. 230–234.
ICDARICDAR-2013-GaoWXSZLS #adaptation
Adaptive Scene Text Detection Based on Transferring Adaboost (SG, CW, BX, CS, YZ, ZL, YS), pp. 388–392.
ICDARICDAR-2013-GebhardtGSD #authentication #documentation #using
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDARICDAR-2013-HaoGZXPSK #automation #fault #finite #transducer
Automated Error Detection and Correction of Chinese Characters in Written Essays Based on Weighted Finite-State Transducer (SH, ZG, MZ, YX, HP, KS, DK), pp. 763–767.
ICDARICDAR-2013-HerasFVLS #architecture
Unsupervised Wall Detector in Architectural Floor Plans (LPdlH, DFM, EV, JL, GS), pp. 1245–1249.
ICDARICDAR-2013-HuangSU
Scene Character Detection by an Edge-Ray Filter (RH, PS, SU), pp. 462–466.
ICDARICDAR-2013-IdikaPV
Achieving Linguistic Provenance via Plagiarism Detection (NCI, HP, MV), pp. 648–652.
ICDARICDAR-2013-JainD #documentation #image #named #verification
VisualDiff: Document Image Verification and Change Detection (RJ, DSD), pp. 40–44.
ICDARICDAR-2013-KasarBACP #documentation #image #learning #using
Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
ICDARICDAR-2013-KessentiniCP #documentation #regular expression #word
Word Spotting and Regular Expression Detection in Handwritten Documents (YK, CC, TP), pp. 516–520.
ICDARICDAR-2013-KhanSM13a
Hyperspectral Imaging for Ink Mismatch Detection (ZK, FS, ASM), pp. 877–881.
ICDARICDAR-2013-KunzeSIK #documentation #off the shelf #process #recognition #using
Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
ICDARICDAR-2013-LiLLLFT #geometry
Detection of Overlapped Quadrangles in Plane Geometric Figures (KL, XL, HL, LL, TF, ZT), pp. 260–264.
ICDARICDAR-2013-LinGTBAS #recognition
A Text Line Detection Method for Mathematical Formula Recognition (XL, LG, ZT, JBB, MA, VS), pp. 339–343.
ICDARICDAR-2013-LiuS #documentation #equation #image
A Simple Equation Region Detector for Printed Document Images in Tesseract (ZL, RS), pp. 245–249.
ICDARICDAR-2013-MoyssetK #algorithm #evaluation #on the
On the Evaluation of Handwritten Text Line Detection Algorithms (BM, CK), pp. 185–189.
ICDARICDAR-2013-NassuMO #documentation #image #towards
Text Line Detection in Document Images: Towards a Support System for the Blind (BTN, RM, LESdO), pp. 638–642.
ICDARICDAR-2013-RabaevBEKD
Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
ICDARICDAR-2013-RazaSDE #multi #using
Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
ICDARICDAR-2013-RebeloC
Staff Line Detection and Removal in the Grayscale Domain (AR, JSC), pp. 57–61.
ICDARICDAR-2013-RigaudBOKW #speech
An Active Contour Model for Speech Balloon Detection in Comics (CR, JCB, JMO, DK, JvdW), pp. 1240–1244.
ICDARICDAR-2013-SankaranJ #fault
Error Detection in Highly Inflectional Languages (NS, CVJ), pp. 1135–1139.
ICDARICDAR-2013-ShivakumaraBGT #video
Detection of Curved Text in Video: Quad Tree Based Method (PS, HTB, DSG, CLT), pp. 594–598.
ICDARICDAR-2013-SunBOK #using
Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
ICDARICDAR-2013-TeradaHFU #on the
On the Possibility of Structure Learning-Based Scene Character Detector (YT, RH, YF, SU), pp. 472–476.
ICDARICDAR-2013-TuarobBMG #automation #documentation #machine learning #pseudo #using
Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
ICDARICDAR-2013-WangSZ #component #multi #segmentation
Natural Scene Text Detection with Multi-channel Connected Component Segmentation (XW, YS, YZ), pp. 1375–1379.
ICDARICDAR-2013-YinLS #analysis #documentation #framework #image #multi #novel
A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDARICDAR-2013-ZagorisP #image #modelling #using
Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
ICDARICDAR-2013-ZhuZ #image #recognition #using
Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
SIGMODSIGMOD-2013-GeorgiadisKGPTM #algorithm #data type #framework #state of the art
Continuous outlier detection in data streams: an extensible framework and state-of-the-art algorithms (DG, MK, AG, ANP, KT, YM), pp. 1061–1064.
VLDBVLDB-2013-AbdelhaqSG #locality #named #online #twitter
EvenTweet: Online Localized Event Detection from Twitter (HA, CS, MG), pp. 1326–1329.
VLDBVLDB-2013-DuttaNB #approach #approximate #data type #streaming
Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
VLDBVLDB-2014-BudakGAA13 #named #network #online #roadmap #social
GeoScope: Online Detection of Geo-Correlated Information Trends in Social Networks (CB, TG, DA, AEA), pp. 229–240.
VLDBVLDB-2014-LiDWLKC13
Attraction and Avoidance Detection from Movements (ZL, BD, FW, TKHL, RK, MC), pp. 157–168.
CSMRCSMR-2013-BertranGCS #architecture
Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
CSMRCSMR-2013-GhaithWPM #analysis #independence #performance #testing
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMRCSMR-2013-NegaraTS #web
Feature Detection in Ajax-Enabled Web Applications (NN, NT, ES), pp. 154–163.
CSMRCSMR-2013-PolychniatisHJBV #dependence
Detecting Cross-Language Dependencies Generically (TP, JH, SJ, EB, JV), pp. 349–352.
CSMRCSMR-2013-StevensRNJ #multi #query #refactoring
A History Querying Tool and Its Application to Detect Multi-version Refactorings (RS, CDR, CN, VJ), pp. 335–338.
ICPCICPC-2013-Kamiya #clone detection #named #semantics
Agec: An execution-semantic clone detection tool (TK), pp. 227–229.
ICPCICPC-2013-MondalRS13a
Improving the detection accuracy of evolutionary coupling (MM, CKR, KAS), pp. 223–226.
ICPCICPC-2013-MurakamiHHIK #analysis #clone detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-UddinRS #clone detection #named #performance #scalability
SimCad: An extensible and faster clone detection tool for large scale software systems (MSU, CKR, KAS), pp. 236–238.
ICSMEICSM-2013-FontanaZMM #approach #machine learning #smell #towards
Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
ICSMEICSM-2013-SorOTS #approach #machine learning #memory management #statistics #using
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
MSRMSR-2013-AlaliBNM #distance #metric #using
A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
MSRMSR-2013-AlipourHS #approach #debugging #towards
A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
MSRMSR-2013-AmouiKATLL #experience #fault #industrial #search-based
Search-based duplicate defect detection: an industrial experience (MA, NK, AAD, LT, SL, WL), pp. 173–182.
MSRMSR-2013-CampbellZXHM #analysis #documentation #topic #using
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-WangG #android #api #case study #developer
Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
SCAMSCAM-2013-CeruloCPC #markov
A Hidden Markov Model to detect coded information islands in free text (LC, MC, MDP, GC), pp. 157–166.
SCAMSCAM-2013-FardM #javascript #named #smell
JSNOSE: Detecting JavaScript Code Smells (AMF, AM), pp. 116–125.
WCREWCRE-2013-AntonyAC #approach #behaviour #clone detection #modelling
An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
WCREWCRE-2013-BernardiCL #approach #design pattern #graph #modelling
A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
WCREWCRE-2013-ChenSB #c #memory management
Who allocated my memory? Detecting custom memory allocators in C binaries (XC, AS, HB), pp. 22–31.
WCREWCRE-2013-ChenSB13a #c #memory management #named
MemBrush: A practical tool to detect custom memory allocators in C binaries (XC, AS, HB), pp. 477–478.
WCREWCRE-2013-DucheneRRG #black box #data flow #modelling #named
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection (FD, SR, JLR, RG), pp. 252–261.
WCREWCRE-2013-HallerSB #c #c++ #data type #named
MemPick: High-level data structure detection in C/C++ binaries (IH, AS, HB), pp. 32–41.
WCREWCRE-2013-HallerSB13a #data type #named
MemPick: A tool for data structure detection (IH, AS, HB), pp. 479–480.
WCREWCRE-2013-KrutzS #clone detection #named
CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
WCREWCRE-2013-NayrollesMV #execution #mining
Improving SOA antipatterns detection in Service Based Systems by mining execution traces (MN, NM, PV), pp. 321–330.
WCREWCRE-2013-SutiiRS #dependence #enterprise #java
Detecting dependencies in Enterprise JavaBeans with SQuAVisiT (AS, SAR, AS), pp. 485–486.
IFMIFM-2013-SavaryFL #bytecode #modelling #testing #using #verification
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
SEFMSEFM-2013-KeshishzadehMM #automation #debugging #domain-specific language #fault #smt #using
Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
SEFMSEFM-2013-SalehKBW #fault #implementation #specification #static analysis #using
Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
AIIDEAIIDE-2013-ChenKS #interactive #learning
Learning Interrogation Strategies while Considering Deceptions in Detective Interactive Stories (GYC, ECCK, VWS).
CoGCIG-2013-AlayedFN #behaviour #machine learning #online #using
Behavioral-based cheating detection in online first person shooters using machine learning techniques (HA, FF, CN), pp. 1–8.
FDGFDG-2013-RijnbouttHKB #game studies #library #mobile #robust
A robust throw detection library for mobile games (ER, OH, RK, RB), pp. 443–444.
GT-VMTGT-VMT-2013-MicallefC #case study #modelling #risk management #visual notation
A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
CHICHI-2013-WisemanCBGO #fault #using
Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
CSCWCSCW-2013-AgustinaS #3d #collaboration #design #realtime
Dependency-conflict detection in real-time collaborative 3D design systems (A, CS), pp. 715–728.
CSCWCSCW-2013-BrooksKTPRSAZHA #chat #collaboration #statistics
Statistical affect detection in collaborative chat (MB, KK, MKT, DP, JJR, TJS, OA, AZ, PH, CRA), pp. 317–328.
HCIDUXU-PMT-2013-Breiner #forensics #interactive
User Interaction Forensics — Detecting and Interpreting the User’s Footprints during Touch Interaction (KB), pp. 193–202.
HCIHCI-III-2013-StorzRMLE #analysis #machine learning #visualisation #workflow
Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCIHCI-III-2013-WangLDHY #set
A Coastline Detection Method Based on Level Set (QW, KL, FD, NH, LY), pp. 216–226.
HCIHCI-III-2013-YangZZJXW #multi #realtime #using
Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
HCIHCI-IMT-2013-EbisawaF #using #video
Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCIHIMI-D-2013-IshiiW #communication #evaluation #self #video
Evaluation of Superimposed Self-character Based on the Detection of Talkers’ Face Angles in Video Communication (YI, TW), pp. 431–438.
HCIHIMI-HSM-2013-SaitohI #learning #using #visualisation
Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
HCIHIMI-LCCB-2013-SuzukiKUIISS #collaboration #multi
Detection of Division of Labor in Multiparty Collaboration (NS, TK, IU, SI, SI, MS, KS), pp. 362–371.
CAiSECAiSE-2013-BakkerFV #approach #hybrid #web
A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
ICEISICEIS-v1-2013-LiuDH #assessment #exception #risk management
Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
CIKMCIKM-2013-FinisRABKF #flexibility #named #performance
RWS-Diff: flexible and efficient change detection in hierarchical data (JPF, MR, NA, RB, AK, FF), pp. 339–348.
CIKMCIKM-2013-KeikhaCC #retrieval
Generalizing diversity detection in blog feed retrieval (MK, FC, WBC), pp. 1201–1204.
CIKMCIKM-2013-McMinnMJ #corpus #scalability #twitter
Building a large-scale corpus for evaluating event detection on twitter (AJM, YM, JMJ), pp. 409–418.
CIKMCIKM-2013-TanGC0Z #named #network #social
UNIK: unsupervised social network spam detection (ET, LG, SC, XZ, YEZ), pp. 479–488.
CIKMCIKM-2013-XieSYPZ #correlation #streaming
Local correlation detection with linearity enhancement in streaming data (QX, SS, BY, CP, XZ), pp. 309–318.
CIKMCIKM-2013-ZhangJSCDZ #classification
Short text classification by detecting information path (SZ, XJ, DS, BC, XD, XZ), pp. 727–732.
CIKMCIKM-2013-ZhuXGC #mobile #perspective #ranking
Ranking fraud detection for mobile apps: a holistic view (HZ, HX, YG, EC), pp. 619–628.
ECIRECIR-2013-DadvarTOJ
Improving Cyberbullying Detection with User Context (MD, DT, RO, FdJ), pp. 693–696.
ECIRECIR-2013-Franco-SalvadorGR #multi #network #semantics #using
Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
ECIRECIR-2013-IgnatovKC #approach
Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
ECIRECIR-2013-McParlaneMW #recommendation #semantics
Detecting Friday Night Party Photos: Semantics for Tag Recommendation (PJM, YM, IW), pp. 756–759.
ECIRECIR-2013-PanchenkoBNF #categorisation #towards
Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames (AP, RB, HN, CF), pp. 776–779.
ECIRECIR-2013-WaltherK #twitter
Geo-spatial Event Detection in the Twitter Stream (MW, MK), pp. 356–367.
ECIRECIR-2013-YatesG #named #social #social media
ADRTrace: Detecting Expected and Unexpected Adverse Drug Reactions from User Reviews on Social Media Sites (AY, NG), pp. 816–819.
ICMLICML-c1-2013-BuhlerRSH #clustering #community #set #source code
Constrained fractional set programs and their application in local clustering and community detection (TB, SSR, SS, MH), pp. 624–632.
ICMLICML-c3-2013-FriedlandJL #social
Copy or Coincidence? A Model for Detecting Social Influence and Duplication Events (LF, DJ, ML), pp. 1175–1183.
ICMLICML-c3-2013-HockingRVB #learning #using
Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
ICMLICML-c3-2013-KoppulaS #learning #process
Learning Spatio-Temporal Structure from RGB-D Videos for Human Activity Detection and Anticipation (HSK, AS), pp. 792–800.
KDDKDD-2013-CiglanLN #community #network #on the
On community detection in real-world networks and the importance of degree assortativity (MC, ML, KN), pp. 1007–1015.
KDDKDD-2013-FeiKSNMH #learning
Heat pump detection from coarse grained smart meter data with positive and unlabeled learning (HF, YK, SS, MRN, SKM, JH), pp. 1330–1338.
KDDKDD-2013-HuaCZLR #named #twitter
STED: semi-supervised targeted-interest event detectionin in twitter (TH, FC, LZ, CTL, NR), pp. 1466–1469.
KDDKDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #process
Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
KDDKDD-2013-StitelmanPDHRP #network #online #scalability #using
Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
KDDKDD-2013-ZhaoH #learning #online
Cost-sensitive online active learning with application to malicious URL detection (PZ, SCHH), pp. 919–927.
KDDKDD-2013-ZimekGCS #effectiveness #performance
Subsampling for efficient and effective unsupervised outlier detection ensembles (AZ, MG, RJGBC, JS), pp. 428–436.
MLDMMLDM-2013-AmalamanER #using
Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
MLDMMLDM-2013-KokkulaM #classification #synthesis #topic
Classification and Outlier Detection Based on Topic Based Pattern Synthesis (SK, NMM), pp. 99–114.
MLDMMLDM-2013-MaziluCGRHT #learning #predict
Feature Learning for Detection and Prediction of Freezing of Gait in Parkinson’s Disease (SM, AC, EG, DR, JMH, GT), pp. 144–158.
MLDMMLDM-2013-NikovskiWESSMT #data analysis
Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
MLDMMLDM-2013-SharmaG
Optimal Time Segments for Stress Detection (NS, TG), pp. 421–433.
SEKESEKE-2013-Al-JamimiA #design pattern #prolog #using
Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (HAAJ, MAA), pp. 727–730.
SEKESEKE-2013-CostaJM #modelling #semantics
Semantic Conflicts Detection in Model-driven Engineering (VOC, JMBOJ, LGPM), pp. 656–661.
SEKESEKE-2013-LenhardW #modelling
Detecting Portability Issues in Model-Driven BPEL Mappings (JL, GW), pp. 18–21.
SEKESEKE-2013-LiuWL #analysis #named #online #performance #pointer
ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKESEKE-2013-OliveiraBVC
Metrics-based Detection of Similar Software (PO, HB, MTV, HAXC), pp. 447–450.
SEKESEKE-2013-ThommazoOORWF #network #traceability
Detecting traceability links through neural networks (ADT, TRdO, GO, RR, VW, SF), pp. 36–41.
SIGIRSIGIR-2013-BonnefoyBB #documentation
A weakly-supervised detection of entity central documents in a stream (LB, VB, PB), pp. 769–772.
SIGIRSIGIR-2013-ChenALC #microblog #topic
Emerging topic detection for organizations from microblogs (YC, HA, ZL, TSC), pp. 43–52.
SIGIRSIGIR-2013-GippMBLN #analysis
Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
SIGIRSIGIR-2013-SavenkovLL #behaviour
Search engine switching detection based on user personal preferences and behavior patterns (DS, DL, QL), pp. 33–42.
SIGIRSIGIR-2013-YinYHH #image #retrieval #robust
Accurate and robust text detection: a step-in for text retrieval in natural scene images (XCY, XY, KH, HWH), pp. 1091–1092.
AMTAMT-2013-TichyKL #model transformation #performance #smell
Detecting Performance Bad Smells for Henshin Model Transformations (MT, CK, GL), pp. 82–91.
MODELSMoDELS-2013-RajbhojR #approach #metamodelling #version control
A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
ECOOPECOOP-2013-FlanaganF #named
RedCard: Redundant Check Elimination for Dynamic Race Detectors (CF, SNF), pp. 255–280.
ECOOPECOOP-2013-ShomratF
Detecting Refactored Clones (MS, YAF), pp. 502–526.
OOPSLAOOPSLA-2013-BaoZ #execution #float #on the fly #problem
On-the-fly detection of instability problems in floating-point program execution (TB, XZ), pp. 817–832.
OOPSLAOOPSLA-2013-BhattacharyaGN #program analysis
Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
OOPSLAOOPSLA-2013-Deng0L #performance
Efficient concurrency-bug detection across inputs (DD, WZ, SL), pp. 785–802.
OOPSLAOOPSLA-2013-RaychevVS #concurrent #effectiveness #source code
Effective race detection for event-driven programs (VR, MTV, MS), pp. 151–166.
OOPSLAOOPSLA-2013-ZhongS #api #documentation #fault
Detecting API documentation errors (HZ, ZS), pp. 803–816.
PLDIPLDI-2013-ElwazeerAKSB #data type #scalability
Scalable variable and data type detection in a binary rewriter (KE, KA, AK, MS, RB), pp. 51–60.
POPLPOPL-2013-BarrVLS #automation #exception #float
Automatic detection of floating-point exceptions (ETB, TV, VL, ZS), pp. 549–560.
PPDPPPDP-2013-CalauttiGT #decidability #logic programming #source code
Detecting decidable classes of finitely ground logic programs with function symbols (MC, SG, IT), pp. 239–250.
ASEASE-2013-ChandramohanTBSP #approach #behaviour #bound #modelling #scalability
A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
ASEASE-2013-Fard #behaviour #distributed #independence #using
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-GhaisasMA #case study #documentation
Detecting system use cases and validations from documents (SG, MM, PRA), pp. 568–573.
ASEASE-2013-GuoZYZZ #android
Characterizing and detecting resource leaks in Android applications (CG, JZ, JY, ZZ, YZ), pp. 389–398.
ASEASE-2013-MoritzVPGMG #api #named #repository #scalability #source code #visualisation
ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
ASEASE-2013-PalombaBPOLP #smell #source code #using
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-RayKPR #consistency #nondeterminism #semantics
Detecting and characterizing semantic inconsistencies in ported code (BR, MK, SP, NR), pp. 367–377.
ASEASE-2013-Zhang0SLMD #automation #constraints #symmetry
Constraint-based automatic symmetry detection (SJZ, JS, CS, YL, JM, JSD), pp. 15–25.
ESEC-FSEESEC-FSE-2013-LiangWXM #debugging
Inferring project-specific bug patterns for detecting sibling bugs (GL, QW, TX, HM), pp. 565–575.
ESEC-FSEESEC-FSE-2013-McPeakGR #debugging #incremental #scalability
Scalable and incremental software bug detection (SM, CHG, MKR), pp. 554–564.
ESEC-FSEESEC-FSE-2013-NguyenX #named
Cachetor: detecting cacheable data to remove bloat (KN, G(X), pp. 268–278.
ESEC-FSEESEC-FSE-2013-PetkeYCH #combinator #fault #interactive #performance #testing
Efficiency and early fault detection with lower and higher strength combinatorial interaction testing (JP, SY, MBC, MH), pp. 26–36.
ESEC-FSEESEC-FSE-2013-SongT #automaton #model checking #named
PoMMaDe: pushdown model-checking for malware detection (FS, TT), pp. 607–610.
ESEC-FSEESEC-FSE-2013-WuHTY #alias #analysis #effectiveness #fault
Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
ICSEICSE-2013-FemmerGLM #case study #consistency #nondeterminism
Detecting inconsistencies in wrappers: a case study (HF, DG, ML, DM), pp. 1022–1031.
ICSEICSE-2013-HermansSPD #clone detection #spreadsheet #visualisation
Data clone detection and visualization in spreadsheets (FH, BS, MP, AvD), pp. 292–301.
ICSEICSE-2013-MalikHH #automation #performance #scalability #testing
Automatic detection of performance deviations in the load testing of large scale systems (HM, HH, AEH), pp. 1012–1021.
ICSEICSE-2013-MarinoHDVTV #concurrent #source code
Detecting deadlock in programs with data-centric synchronization (DM, CH, JD, MV, FT, JV), pp. 322–331.
ICSEICSE-2013-NguyenNNN #named #web
DRC: a detection tool for dangling references in PHP-based web applications (HVN, HAN, TTN, TNN), pp. 1299–1302.
ICSEICSE-2013-NistorSML #data access #named #performance #problem
Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
ICSEICSE-2013-Simpson #communication #developer
Changeset based developer communication to detect software failures (BS), pp. 1468–1470.
ICSEICSE-2013-StephanASC #analysis #clone detection #comparison #framework #mutation testing #using
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
ICSEICSE-2013-TianD #model checking
Detecting spurious counterexamples efficiently in abstract model checking (CT, ZD), pp. 202–211.
ICSEICSE-2013-ZhengZ #execution #static analysis #web
Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
SACSAC-2013-BakkerVFK #web
Model words-driven approaches for duplicate detection on the web (MdB, DV, FF, UK), pp. 717–723.
SACSAC-2013-BanerjeeSS #monitoring #using
Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SACSAC-2013-ChaeKHLW #api
Software plagiarism detection via the static API call frequency birthmark (DKC, SWK, JH, SCL, GW), pp. 1639–1643.
SACSAC-2013-CostaBM #network #social
Detecting tip spam in location-based social networks (HC, FB, LHdCM), pp. 724–729.
SACSAC-2013-DietrichRP #clustering #visual notation
Exploiting visual appearance to cluster and detect rogue software (CJD, CR, NP), pp. 1776–1783.
SACSAC-2013-FariaGC #algorithm #data type #multi #problem
Novelty detection algorithm for data streams multi-class problems (ERF, JG, ACPLFC), pp. 795–800.
SACSAC-2013-HassanzadehN #algorithm #graph
A semi-supervised graph-based algorithm for detecting outliers in online-social-networks (RH, RN), pp. 577–582.
SACSAC-2013-HuangXCL #adaptation #algorithm #analysis #implementation #parallel #random testing #testing
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SACSAC-2013-KimM #algorithm #hybrid #search-based #using
Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SACSAC-2013-LeitaoC #adaptation #optimisation #performance #using #xml
Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SACSAC-2013-PerkusichAP #development #problem
A model to detect problems on scrum-based software development projects (MP, HOdA, AP), pp. 1037–1042.
SACSAC-2013-RieckerBH #energy #lightweight #network
Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
SACSAC-2013-TeixeiraRG #locality #parallel #using
Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
SLESLE-2013-VasudevanT #ambiguity #programming language
Detecting Ambiguity in Programming Language Grammars (NV, LT), pp. 157–176.
ASPLOSASPLOS-2013-QianTSQ #consistency #named #precise #scalability
Volition: scalable and precise sequential consistency violation detection (XQ, JT, BS, DQ), pp. 535–548.
ASPLOSASPLOS-2013-WesterDCFN #concurrent
Parallelizing data race detection (BW, DD, PMC, JF, SN), pp. 27–38.
CASECASE-2013-LanzaKPSS #analysis #automation #fault #using
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-LinG #framework #network #optimisation #synthesis
Synthesis and optimization of a Bayesian belief network based observation platform for anomaly detection under partial and unreliable observations (WCL, HEG), pp. 51–58.
CASECASE-2013-WeeklyRZBNS #low cost #matter
Low-cost coarse airborne particulate matter sensing for indoor occupancy detection (KW, DR, LZ, AMB, WWN, CJS), pp. 32–37.
CASECASE-2013-YanLS #fault #process #statistics
Fault detection of cooling coils based on unscented Kalman filters and statistical process control (YY, PBL, BS), pp. 237–242.
CASECASE-2013-ZhouL #realtime #throughput
Real time electricity demand response for sustainable manufacturing systems considering throughput bottleneck detection (ZZ, LL), pp. 640–644.
CGOCGO-2013-TanFG #fault #lightweight #source code
Lightweight fault detection in parallelized programs (LT, MF, RG), p. 11.
DACDAC-2013-LiaoHL #fault
GPU-based n-detect transition fault ATPG (KYL, SCH, JCML), p. 8.
DACDAC-2013-LinCLWC #fuzzy #novel
A novel fuzzy matching model for lithography hotspot detection (SYL, JYC, JCL, WYW, SCC), p. 6.
DACDAC-2013-WangK #control flow #hardware #kernel #named #performance #using
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DACDAC-2013-WeiP #hardware
The undetectable and unprovable hardware trojan horse (SW, MP), p. 2.
DACDAC-2013-YuLJC #classification #feature model #using
Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATEDATE-2013-AnanthanarayananGP #fault #low cost #set #using
Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATEDATE-2013-ChaG #approach #effectiveness #metric
Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
DATEDATE-2013-DeOrioLBB #debugging #machine learning
Machine learning-based anomaly detection for post-silicon bug diagnosis (AD, QL, MB, VB), pp. 491–496.
DATEDATE-2013-El-NacouziAPZJM #scalability
A dual grain hit-miss detector for large die-stacked DRAM caches (MEN, IA, MP, JZ, NDEJ, AM), pp. 89–92.
DATEDATE-2013-HuHMCF #fault #realtime
Fault detection, real-time error recovery, and experimental demonstration for digital microfluidic biochips (KH, BNH, AM, KC, RBF), pp. 559–564.
DATEDATE-2013-HuNRK #hardware #multimodal #using
High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATEDATE-2013-KocBKE #fault
Exploiting replicated checkpoints for soft error detection and correction (FK, KB, BK, OE), pp. 1494–1497.
DATEDATE-2013-LinHLFGHM #challenge #fault #validation
Overcoming post-silicon validation challenges through quick error detection (QED) (DL, TH, YL, FF, DSG, NH, SM), pp. 320–325.
DATEDATE-2013-PontarelliOEW #fault #using
Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATEDATE-2013-SarrazinENBG #concurrent #design #fault #performance
Scan design with shadow flip-flops for low performance overhead and concurrent delay fault detection (SS, SE, LAdBN, YB, VG), pp. 1077–1082.
DATEDATE-2013-YalcinUC #fault #hardware #memory management #named #transaction #using
FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATEDATE-2013-ZhaoLBT #manycore #probability #runtime
Run-time probabilistic detection of miscalibrated thermal sensors in many-core systems (JZ, S(L, WB, RT), pp. 1395–1398.
HPDCHPDC-2013-HeBTGGMS
I/O acceleration with pattern detection (JH, JB, AT, GG, GAG, CM, XHS), pp. 25–36.
HPDCHPDC-2013-ZhouTKB #automation #debugging #named #scalability
WuKong: automatically detecting and localizing bugs that manifest at large system scales (BZ, JT, MK, SB), pp. 131–142.
LCTESLCTES-2013-ChenY #comparison #fault #performance
Boosting efficiency of fault detection and recovery throughapplication-specific comparison and checkpointing (HC, CY), pp. 13–20.
PDPPDP-2013-GarbadeWSFU #fault #network
Impact of Message Based Fault Detectors on Applications Messages in a Network on Chip (AG, SW, SS, BF, TU), pp. 470–477.
PDPPDP-2013-GeleriTT #algorithm
Parallelizing Broad Phase Collision Detection Algorithms for Sampling Based Path Planners (FG, OT, HT), pp. 384–391.
PPoPPPPoPP-2013-CaiZWC #named #parallel #source code #thread
TeamWork: synchronizing threads globally to detect real deadlocks for multithreaded programs (YC, KZ, SW, WKC), pp. 311–312.
PPoPPPPoPP-2013-Chen #algorithm #fault #fault tolerance #named #online
Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods (ZC), pp. 167–176.
PPoPPPPoPP-2013-LifflanderMK #fault tolerance #protocol #termination
Adoption protocols for fanout-optimal fault-tolerant termination detection (JL, PM, LVK), pp. 13–22.
PPoPPPPoPP-2013-ParkSI #concurrent #scalability #source code
Scalable data race detection for partitioned global address space programs (CSP, KS, CI), pp. 305–306.
SOSPSOSP-2013-KasikciZC #concurrent #crowdsourcing #named
RaceMob: crowdsourced data race detection (BK, CZ, GC), pp. 406–422.
STOCSTOC-2013-FeldmanGRVX #algorithm #bound #clique #statistics
Statistical algorithms and a lower bound for detecting planted cliques (VF, EG, LR, SV, YX), pp. 655–664.
TACASTACAS-2013-SongT #ltl #model checking
LTL Model-Checking for Malware Detection (FS, TT), pp. 416–431.
CAVCAV-2013-KroeningLW #approximate #c #performance #source code
Under-Approximating Loops in C Programs for Fast Counterexample Detection (DK, ML, GW), pp. 381–396.
ICLPICLP-J-2013-CatB #dependence #functional #generative
Detection and exploitation of functional dependencies for model generation (BdC, MB), pp. 471–485.
ICSTICST-2013-ChristakisGS #concurrent #erlang #fault #source code #testing
Systematic Testing for Detecting Concurrency Errors in Erlang Programs (MC, AG, KFS), pp. 154–163.
ICSTICST-2013-GreilerDS #automation #smell
Automated Detection of Test Fixture Strategies and Smells (MG, AvD, MADS), pp. 322–331.
ISSTAISSTA-2013-RadoiD #concurrent #java #parallel
Practical static race detection for Java parallel loops (CR, DD), pp. 178–190.
ICSTSAT-2013-MisraORS #bound #set
Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
WICSA-ECSAWICSA-ECSA-2012-AstekinS #analysis #clone detection #simulation
Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
DRRDRR-2012-FengY #component #composition #documentation #using
Using connected component decomposition to detect straight line segments in documents (XF, AY).
DRRDRR-2012-Silva #algorithm #evaluation #using
Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
HTHT-2012-ChakrabortyGG #community #folksonomy
Detecting overlapping communities in folksonomies (AC, SG, NG), pp. 213–218.
HTHT-2012-FlockVS #wiki
Revisiting reverts: accurate revert detection in wikipedia (FF, DV, ES), pp. 3–12.
HTHT-2012-JainHVYS #linked data #open data
Moving beyond SameAs with PLATO: partonomy detection for linked data (PJ, PH, KV, PZY, APS), pp. 33–42.
HTHT-2012-LimD #community #twitter
Following the follower: detecting communities with common interests on twitter (KHL, AD), pp. 317–318.
HTHT-2012-NakajimaZIN #analysis #scalability
Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
HTHT-2012-SofeanS #architecture #design #evaluation #implementation #network #realtime #social #using
A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
JCDLJCDL-2012-BogenFS #evaluation
A quantitative evaluation of techniques for detection of abnormal change events in blogs (PLBI, RF, FS), pp. 157–166.
SIGMODSIGMOD-2012-ZellagK #consistency #named #realtime
ConsAD: a real-time consistency anomalies detector (KZ, BK), pp. 641–644.
TPDLTPDL-2012-SumbanaGSAV #automation #classification #wiki
Automatic Vandalism Detection in Wikipedia with Active Associative Classification (MS, MAG, RSO, JMA, AV), pp. 138–143.
VLDBVLDB-2012-Bidoit-TolluCU #independence #type system #xml
Type-Based Detection of XML Query-Update Independence (NBT, DC, FU), pp. 872–883.
VLDBVLDB-2012-GraefeK #database
Definition, Detection, and Recovery of Single-Page Failures, a Fourth Class of Database Failures (GG, HAK), pp. 646–655.
ITiCSEITiCSE-2012-PoonSTK #corpus #source code
Instructor-centric source code plagiarism detection and plagiarism corpus (JYHP, KS, YFT, MYK), pp. 122–127.
CSMRCSMR-2012-BinunK #design pattern #named
DPJF — Design Pattern Detection with High Accuracy (AB, GK), pp. 245–254.
CSMRCSMR-2012-DeissenboeckHHW #challenge
Challenges of the Dynamic Detection of Functionally Similar Code Fragments (FD, LH, BH, SW), pp. 299–308.
CSMRCSMR-2012-FontanaCZ #benchmark #design pattern #metric #named #tool support
DPB: A Benchmark for Design Pattern Detection Tools (FAF, AC, MZ), pp. 235–244.
CSMRCSMR-2012-KaushikT #case study #comparative #debugging #information retrieval #modelling #performance
A Comparative Study of the Performance of IR Models on Duplicate Bug Detection (NK, LT), pp. 159–168.
CSMRCSMR-2012-Koschke #clone detection #scalability #using
Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
CSMRCSMR-2012-NadiH #linux #mining #variability
Mining Kbuild to Detect Variability Anomalies in Linux (SN, RCH), pp. 107–116.
ICPCICPC-2012-HauptmannJEJV #clone detection #comprehension #question
Can clone detection support test comprehension? (BH, MJ, SE, EJ, RV), pp. 209–218.
ICPCICPC-2012-Keivanloo #clone detection #code search #source code
Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
ICPCICPC-2012-KeivanlooRR #clone detection #named #semantics
SeByte: A semantic clone detection tool for intermediate languages (IK, CKR, JR), pp. 247–249.
ICPCICPC-2012-SajnaniOL #clone detection #parallel #pipes and filters #using
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSMEICSM-2012-Al-KofahiNNNN #semantics
Detecting semantic changes in Makefile build code (JMAK, HVN, ATN, TTN, TNN), pp. 150–159.
ICSMEICSM-2012-AlalfiCDSS #clone detection #modelling
Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
ICSMEICSM-2012-FadhelKLW #search-based
Search-based detection of high-level model changes (AbF, MK, PL, MW), pp. 212–221.
ICSMEICSM-2012-HermansPD #smell #spreadsheet
Detecting code smells in spreadsheet formulas (FH, MP, AvD), pp. 409–418.
ICSMEICSM-2012-HigoK #consistency #how #nondeterminism
How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
ICSMEICSM-2012-RamaKVP #source code #version control
Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
ICSMEICSM-2012-TangWZL #maintenance
Time-leverage point detection for time sensitive software maintenance (ET, LW, JZ, XL), pp. 567–570.
ICSMEICSM-2012-ThungLJ #collaboration
Detecting similar applications with collaborative tagging (FT, DL, LJ), pp. 600–603.
ICSMEICSM-2012-ZouG #algorithm #automation #case study #industrial #what #why
An industrial case study of Coman’s automated task detection algorithm: What Worked, What Didn’t, and Why (LZ, MWG), pp. 6–14.
MSRMSR-2012-Breckel #comparison #database #debugging #fault #mining #scalability
Error mining: Bug detection through comparison with large code databases (AB), pp. 175–178.
SCAMSCAM-2012-GethersAP #concept #database #dependence
Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies (MG, AA, DP), pp. 144–153.
SCAMSCAM-2012-MurakamiHHIK #clone detection
Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
WCREWCRE-2012-Al-OmariKRR #dot-net #programming language
Detecting Clones Across Microsoft .NET Programming Languages (FAO, IK, CKR, JR), pp. 405–414.
WCREWCRE-2012-DurfinaKZK #decompiler
Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler (LD, JK, PZ, BK), pp. 51–60.
WCREWCRE-2012-GauthierM #data access #performance #php
Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
WCREWCRE-2012-HemelK #case study #clone detection #linux #reverse engineering #source code #using #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-IshiharaHHIK #clone detection #empirical #functional #library #towards
Inter-Project Functional Clone Detection Toward Building Libraries — An Empirical Study on 13, 000 Projects (TI, KH, YH, HI, SK), pp. 387–391.
WCREWCRE-2012-JanaN #dynamic analysis #precise #using
Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCREWCRE-2012-LavoieKMZ #clone detection #nearest neighbour #repository #using
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
WCREWCRE-2012-MaigaABSGA #anti #approach #incremental #named
SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
ICALPICALP-v1-2012-LaplanteLR #bound #quantum
Classical and Quantum Partition Bound and Detector Inefficiency (SL, VL, JR), pp. 617–628.
FMFM-2012-SongT #model checking #performance #using
Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
IFMIFM-2012-HoomanMW #abstraction #fault #industrial #modelling #using
Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
IFMIFM-2012-TianBB #behaviour #game studies #multi
Behaviour-Based Cheat Detection in Multiplayer Games with Event-B (HT, PJB, AGB), pp. 206–220.
AIIDEAIIDE-2012-BarikHRJ #game studies #social
Spatial Game Signatures for Bot Detection in Social Games (TB, BEH, DLR, XJ).
CoGVS-Games-2012-AsteriadisKSY #behaviour #clustering #towards #using #visual notation
Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues (SA, KK, NS, GNY), pp. 140–147.
CHICHI-2012-HollandKT #algorithm #identification #usability #visual notation
Identifying usability issues via algorithmic detection of excessive visual search (CH, OK, DET), pp. 2943–2952.
CHICHI-2012-ViS #design #interactive
Detecting error-related negativity for interaction design (CV, SS), pp. 493–502.
CSCWCSCW-2012-LiuBS #collaboration #design #product line
Conflict detection and resolution for product line design in a collaborative decision making environment (X(L, ECB, JES), pp. 1327–1336.
EDOCEDOC-2012-CostaMPA #approach #modelling #rule-based
A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
EDOCEDOC-2012-HarrisonBADN #framework #identification
A Framework for Detecting Malware in Cloud by Identifying Symptoms (KH, BB, STTA, CID, APN), pp. 164–172.
ICEISICEIS-v3-2012-WangWZLW #modelling #process
Detecting Infeasible Traces in Process Models (ZW, LW, XZ, YL, JW), pp. 212–217.
CIKMCIKM-2012-AkogluTVF #category theory #performance #reliability
Fast and reliable anomaly detection in categorical data (LA, HT, JV, CF), pp. 415–424.
CIKMCIKM-2012-BaeJKL #using
Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
CIKMCIKM-2012-CaballeroBA #topic
The generalized dirichlet distribution in enhanced topic detection (KLCE, JB, RA), pp. 773–782.
CIKMCIKM-2012-ComarLSNT #kernel #linear
Weighted linear kernel with tree transformed features for malware detection (PMC, LL, SS, AN, PNT), pp. 2287–2290.
CIKMCIKM-2012-HuangQYY #algorithm #robust
Local anomaly descriptor: a robust unsupervised algorithm for anomaly detection based on diffusion space (HH, HQ, SY, DY), pp. 405–414.
CIKMCIKM-2012-LiSD #named #twitter
Twevent: segment-based event detection from tweets (CL, AS, AD), pp. 155–164.
CIKMCIKM-2012-QahtanZW #estimation #performance
Efficient estimation of dynamic density functions with an application to outlier detection (AAQ, XZ, SW), pp. 2159–2163.
CIKMCIKM-2012-TangY #named #roadmap #social #social media #statistics #topic
TUT: a statistical model for detecting trends, topics and user interests in social media (XT, CCY), pp. 972–981.
CIKMCIKM-2012-XiangFWHR #corpus #scalability #topic #twitter
Detecting offensive tweets via topical feature discovery over a large scale twitter corpus (GX, BF, LW, JIH, CPR), pp. 1980–1984.
ECIRECIR-2012-BosmaMW #framework #network #social
A Framework for Unsupervised Spam Detection in Social Networking Sites (MB, EM, WW), pp. 364–375.
ECIRECIR-2012-PolajnarGA
Detection of News Feeds Items Appropriate for Children (TP, RG, LA), pp. 63–72.
ICMLICML-2012-BiessmannPBH #canonical #roadmap #web
Canonical Trends: Detecting Trend Setters in Web Data (FB, JMP, MLB, AH), p. 170.
ICMLICML-2012-MalisiewiczSGE #image #retrieval #visual notation
Exemplar-SVMs for Visual Ob ject Detection, Label Transfer and Image Retrieval (TM, AS, AG, AAE), p. 4.
ICPRICPR-2012-AhmedC #robust
A robust person detector for overhead views (IA, JNC), pp. 1483–1486.
ICPRICPR-2012-AjmeraD #analysis #word
Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
ICPRICPR-2012-BagdanovBLM #multi
Multi-pose face detection for accurate face logging (ADB, ADB, GL, IM), pp. 2448–2451.
ICPRICPR-2012-BaiZX #linear #multi
Multi scale multi structuring element top-hat transform for linear feature detection (XB, FZ, BX), pp. 1920–1923.
ICPRICPR-2012-BarbulescuGGMR #2d #3d #estimation #using
3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
ICPRICPR-2012-BurghoutsS #correlation
Correlations between 48 human actions improve their detection (GJB, KS), pp. 3815–3818.
ICPRICPR-2012-ChengLWTCBWS
Peripapillary atrophy detection by biologically inspired feature (JC, JL, DWKW, NMT, CYlC, MB, TYW, SMS), pp. 53–56.
ICPRICPR-2012-ChenYZZ #bound #network
Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
ICPRICPR-2012-CheungP #using
Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
ICPRICPR-2012-ChoKKA #kernel
Bilateral kernel-based Region Detector (WC, SYK, AK, MAA), pp. 750–753.
ICPRICPR-2012-ChowdhuryBP #using
Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
ICPRICPR-2012-DahmBCG #morphism
Topological features and iterative node elimination for speeding up subgraph isomorphism detection (ND, HB, TC, YG), pp. 1164–1167.
ICPRICPR-2012-DaiFZ #mining
Mining sub-categories for object detection (JD, JF, JZ), pp. 3260–3263.
ICPRICPR-2012-DeshmukhRSL
Vocalization patterns of dairy animals to detect animal state (OD, NR, YS, SL), pp. 254–257.
ICPRICPR-2012-DinhLLRD #image #multi
Training data selection for cancer detection in multispectral endoscopy images (VCD, ML, RL, OR, RPWD), pp. 161–164.
ICPRICPR-2012-DuongDNLDLS #eye tracking #locality #robust #video
Robust eye localization in video by combining eye detector and eye tracker (CND, TCPD, TDN, DDL, DAD, BHL, SS), pp. 242–245.
ICPRICPR-2012-FelhiBT #image
A skeleton based descriptor for detecting text in real scene images (MF, NB, ST), pp. 282–285.
ICPRICPR-2012-FengB #concept #image #semantics
Utilizing co-occurrence patterns for semantic concept detection in images (LF, BB), pp. 2918–2921.
ICPRICPR-2012-GaoM #analysis #canonical #correlation #kernel #multi #using
Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPRICPR-2012-GerogiannisNL #image #performance
Fast and efficient vanishing point detection in indoor images (DG, CN, AL), pp. 3244–3247.
ICPRICPR-2012-GhianiMR #liveness
Fingerprint liveness detection by local phase quantization (LG, GLM, FR), pp. 537–540.
ICPRICPR-2012-GlazerLM
Feature shift detection (AG, ML, SM), pp. 1383–1386.
ICPRICPR-2012-Goldstein #algorithm #named
FastLOF: An Expectation-Maximization based Local Outlier detection algorithm (MG), pp. 2282–2285.
ICPRICPR-2012-GuermaziVB #image #multi
Matching of multi-resolution image for remote sensing glacier detection (AG, LV, PB), pp. 3406–3410.
ICPRICPR-2012-GuR
Shadow detection via Rayleigh scattering and Mie theory (LG, ARK), pp. 2165–2168.
ICPRICPR-2012-GuyonBZ #constraints #matrix #rank #robust
Foreground detection via robust low rank matrix factorization including spatial constraint with Iterative reweighted regression (CG, TB, EHZ), pp. 2805–2808.
ICPRICPR-2012-HardingHCLC #automation #image
Automated detection of skeletal muscle twitches from B-mode ultrasound images: An application to motor neuron disease (PJH, EFHT, RC, IL, NC), pp. 2630–2633.
ICPRICPR-2012-Ho #approach #effectiveness
An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
ICPRICPR-2012-HuangA #analysis #perspective
Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
ICPRICPR-2012-HuangL #analysis #automation #component #independence
Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
ICPRICPR-2012-HuangLW #clustering #incremental
Incremental support vector clustering with outlier detection (DH, JHL, CDW), pp. 2339–2342.
ICPRICPR-2012-HuangOSU #framework #multi #recognition
Scene character detection and recognition based on multiple hypotheses framework (RH, SO, PS, SU), pp. 717–720.
ICPRICPR-2012-IkemuraF #using
Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
ICPRICPR-2012-ItoOWK
Detection of eyes by circular Hough transform and histogram of gradient (YI, WO, TW, FK), pp. 1795–1798.
ICPRICPR-2012-JiangES #estimation #integration #performance #robust
Efficient and robust integration of face detection and head pose estimation (FJ, HKE, BES), pp. 1578–1581.
ICPRICPR-2012-JiangFZT #random
Active Shape Model with random forest for facial features detection (WJ, YF, ZZ, YT), pp. 593–596.
ICPRICPR-2012-KataokaSM #using
Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
ICPRICPR-2012-KennardBS #2d #approach #geometry #using #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-KhanER #image
A Gamma-Gaussian mixture model for detection of mitotic cells in breast cancer histopathology images (AMK, HED, NMR), pp. 149–152.
ICPRICPR-2012-KunchevaF #feature model #multi #streaming
PCA feature extraction for change detection in multidimensional unlabelled streaming data (LIK, WJF), pp. 1140–1143.
ICPRICPR-2012-LankinenKK #categorisation #comparison #visual notation
A comparison of local feature detectors and descriptors for visual object categorization by intra-class repeatability and matching (JL, VK, JKK), pp. 780–783.
ICPRICPR-2012-LeeLM #realtime #smarttech
Real-time staircase detection from a wearable stereo system (YHL, TSL, GGM), pp. 3770–3773.
ICPRICPR-2012-LePB #navigation #people
Pedestrian lane detection for assistive navigation of blind people (MCL, SLP, AB), pp. 2594–2597.
ICPRICPR-2012-LiL
Scene text detection via stroke width (YL, HL), pp. 681–684.
ICPRICPR-2012-LiP
Anomalous tie plate detection for railroad inspection (YL, SP), pp. 3017–3020.
ICPRICPR-2012-LiSY #invariant
A Fully Affine Invariant Feature detector (WL, ZS, JY), pp. 2768–2771.
ICPRICPR-2012-LiuL #analysis #learning #multi
Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
ICPRICPR-2012-LiuSZWBCT #bound
Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPRICPR-2012-MaB #multi
Multi-view multi-class object detection via exemplar compounding (KM, JBA), pp. 3256–3259.
ICPRICPR-2012-MadabusiG #image
Edge detection for facial images under noisy conditions (SM, SVG), pp. 2689–2693.
ICPRICPR-2012-MaLXS #image #using
Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
ICPRICPR-2012-MartelliCBTM #paradigm #similarity
Joining feature-based and similarity-based pattern description paradigms for object detection (SM, MC, LB, DT, VM), pp. 2702–2705.
ICPRICPR-2012-McCloskeyD #metadata #process #using #video
Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
ICPRICPR-2012-MiksikM #evaluation #performance
Evaluation of local detectors and descriptors for fast feature matching (OM, KM), pp. 2681–2684.
ICPRICPR-2012-MinagawaKTH #automation
A color chart detection method for automatic color correction (AM, YK, HT, YH), pp. 1912–1915.
ICPRICPR-2012-MinKCK #approach #higher-order #using
A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPRICPR-2012-MogelmoseTM #comparative #dataset #evaluation #learning
Learning to detect traffic signs: Comparative evaluation of synthetic and real-world datasets (AM, MMT, TBM), pp. 3452–3455.
ICPRICPR-2012-NarayanamN #algorithm #community #distributed #game studies #graph #information management #social
A game theory inspired, decentralized, local information based algorithm for community detection in social graphs (RN, YN), pp. 1072–1075.
ICPRICPR-2012-NguyenPRPV #multi #segmentation #video
Multi-modal abnormality detection in video with unknown data segmentation (TVN, DQP, SR, DSP, SV), pp. 1322–1325.
ICPRICPR-2012-NiigakiSM #using
Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
ICPRICPR-2012-Ohtsuka #analysis
Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
ICPRICPR-2012-PanZXQ #2d #category theory
Improved generic categorical object detection fusing depth cue with 2D appearance and shape features (HP, YZ, SX, KQ), pp. 1467–1470.
ICPRICPR-2012-PhamDBR #image #re-engineering
Accurate junction detection and reconstruction in line-drawing images (TAP, MD, SB, JYR), pp. 693–696.
ICPRICPR-2012-PhanST #symmetry #using
Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
ICPRICPR-2012-RadwanDG #estimation
Correcting pose estimation with implicit occlusion detection and rectification (IR, AD, RG), pp. 3496–3499.
ICPRICPR-2012-RoyG #framework #image #locality #probability
A probabilistic framework for logo detection and localization in natural scene images (AR, UG), pp. 2051–2054.
ICPRICPR-2012-RoyH #classification #component #documentation #image #using
Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
ICPRICPR-2012-SakaiKMK #robust
Robust detection of adventitious lung sounds in electronic auscultation signals (TS, MK, SM, SK), pp. 1993–1996.
ICPRICPR-2012-SanLH
Constrained-MSER detection of retinal pathology (GLYS, MLL, WH), pp. 2059–2062.
ICPRICPR-2012-Schmidt-HackenbergYB #image #visual notation
Visual cortex inspired features for object detection in X-ray images (LSH, MRY, TMB), pp. 2573–2576.
ICPRICPR-2012-SharmaHN #classification #incremental #learning #performance
Efficient incremental learning of boosted classifiers for object detection (PS, CH, RN), pp. 3248–3251.
ICPRICPR-2012-ShaukatGWB #approach #bottom-up #top-down
Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
ICPRICPR-2012-ShiLBH
Context-driven moving vehicle detection in wide area motion imagery (XS, HL, EB, WH), pp. 2512–2515.
ICPRICPR-2012-ShinPJB #using
Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
ICPRICPR-2012-SiddiquieFDD #invariant
Unsupervised model selection for view-invariant object detection in surveillance environments (BS, RSF, AD, LSD), pp. 3252–3255.
ICPRICPR-2012-SimoesSW #image #using
Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
ICPRICPR-2012-SjobergKIL #classification #concept #linear #realtime #scalability #visual notation
Real-time large-scale visual concept detection with linear classifiers (MS, MK, SI, JL), pp. 421–424.
ICPRICPR-2012-SommerFHG #image
Learning-based mitotic cell detection in histopathological images (CS, LF, FAH, DG), pp. 2306–2309.
ICPRICPR-2012-SoranHLS #using
Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
ICPRICPR-2012-SpampinatoP #performance
Enhancing object detection performance by integrating motion objectness and perceptual organization (CS, SP), pp. 3640–3643.
ICPRICPR-2012-SrikanthaSM #approach #image
An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
ICPRICPR-2012-StrokinaMELK
Detection of bubbles as Concentric Circular Arrangements (NS, JM, TE, LL, HK), pp. 2655–2659.
ICPRICPR-2012-TangHW #multi #recognition
Hand-dorsa vein recognition based on multi-level keypoint detection and local feature matching (YT, DH, YW), pp. 2837–2840.
ICPRICPR-2012-TangW #semantics
Semantic Hough Transform based object detection with Partial Least Squares (JT, HW), pp. 3652–3655.
ICPRICPR-2012-ThanhMNMY #recognition #robust #using
Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
ICPRICPR-2012-TiribuziPVR #framework #kernel #learning #multi
A Multiple Kernel Learning framework for detecting altered fingerprints (MT, MP, PV, ER), pp. 3402–3405.
ICPRICPR-2012-Ugurlu #using
Head posture detection using skin and hair information (YU), pp. 1–4.
ICPRICPR-2012-VazquezLP #adaptation
Unsupervised domain adaptation of virtual and real worlds for pedestrian detection (DV, AML, DP), pp. 3492–3495.
ICPRICPR-2012-VitaladevuniCPN #documentation #image #using
Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
ICPRICPR-2012-WakayamaDDIMT #estimation #performance #visual notation
Estimation of the human performance for pedestrian detectability based on visual search and motion features (MW, DD, KD, II, HM, YT), pp. 1940–1943.
ICPRICPR-2012-WangBLST #re-engineering
Detecting discontinuities for surface reconstruction (YW, JB, NL, MS, PT), pp. 2108–2111.
ICPRICPR-2012-WangCCP #realtime #using
Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
ICPRICPR-2012-WangGL #image
A new depth descriptor for pedestrian detection in RGB-D images (NW, XG, JL), pp. 3688–3691.
ICPRICPR-2012-WangPLQHJ
Color Maximal-Dissimilarity Pattern for pedestrian detection (QW, JP, GL, LQ, QH, SJ), pp. 1952–1955.
ICPRICPR-2012-WechtitschFS #fault #robust
Robust detection of single-frame defects in archived film (SW, HF, PS), pp. 2647–2650.
ICPRICPR-2012-WeibelDWR #graph #using
Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
ICPRICPR-2012-WidhalmNB #smarttech
Transport mode detection with realistic Smartphone sensor data (PW, PN, NB), pp. 573–576.
ICPRICPR-2012-WongLTYLTCW #automation #image
Detecting the optic cup excavation in retinal fundus images by automatic detection of vessel kinking (DWKW, JL, NMT, FY, BHL, YCT, CYlC, TYW), pp. 73–76.
ICPRICPR-2012-XiaDG #invariant
An accurate and contrast invariant junction detector (GSX, JD, YG), pp. 2780–2783.
ICPRICPR-2012-XiangL #symmetry
Symmetric object detection based on symmetry and centripetal-SIFT edge descriptor (YX, SL), pp. 1403–1406.
ICPRICPR-2012-YamashitaTHNH #representation
Sparse representation of audio features for sputum detection from lung sounds (TY, ST, KH, YN, SH), pp. 2005–2008.
ICPRICPR-2012-YuYL #image
Ulcer detection in wireless capsule endoscopy images (LY, PCY, JHL), pp. 45–48.
ICPRICPR-2012-ZhangL #using
Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
ICPRICPR-2012-ZhangLC #analysis #multi #novel
A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
ICPRICPR-2012-ZhangLM12a #adaptation #automation #clustering #fault
An adaptive unsupervised clustering of pronunciation errors for automatic pronunciation error detection (LZ, HL, LM), pp. 1521–1525.
ICPRICPR-2012-ZhangLMA #independence #statistics
A viewpoint-independent statistical method for fall detection (ZZ, WL, VM, VA), pp. 3626–3630.
ICPRICPR-2012-ZhangRZY #random
Contour detection via random forest (CZ, XR, YZ, MHY), pp. 2772–2775.
ICPRICPR-2012-ZhangWBZCZ #feature model
Object detection via foreground contour feature selection and part-based shape model (HZ, JW, XB, JZ, JC, HZ), pp. 2524–2527.
ICPRICPR-2012-ZhangWDP #linear
Skin detection via linear regression tree (JZ, HW, FD, CP), pp. 1711–1714.
ICPRICPR-2012-ZhangWN #feature model #student
Bayesian feature selection and model detection for student’s t-mixture distributions (HZ, QMJW, TMN), pp. 1631–1634.
ICPRICPR-2012-ZhangWSD #approach #effectiveness
A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
ICPRICPR-2012-ZhangXY #bound #modelling
An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
ICPRICPR-2012-ZhangZHHT #mining #semantics
Semantic windows mining in sliding window based object detection (JZ, XZ, YH, KH, TT), pp. 3264–3267.
ICPRICPR-2012-ZhaoL #3d
Patch based saliency detection method for 3D surface simplification (YZ, YL), pp. 845–848.
ICPRICPR-2012-ZhaoZWL #graph #mobile #robust
Robust mobile spamming detection via graph patterns (YZ, ZZ, YW, JL), pp. 983–986.
ICPRICPR-2012-ZhouLYCL
Corner-surround Contrast for saliency detection (QZ, NL, YY, PC, WL), pp. 1423–1426.
KDDKDD-2012-BatalFHMH #mining #multi
Mining recent temporal patterns for event detection in multivariate time series data (IB, DF, JH, FM, MH), pp. 280–288.
KDDKDD-2012-DingKBKC #anti #communication #social
Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
KDDKDD-2012-GuptaGSH #community #mining
Integrating community matching and outlier detection for mining evolutionary community outliers (MG, JG, YS, JH), pp. 859–867.
KDDKDD-2012-HiraiY #clustering #normalisation #using
Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDDKDD-2012-PhamP #algorithm #approximate
A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data (NP, RP), pp. 877–885.
KDDKDD-2012-WuWCT #hybrid #named #recommendation
HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation (ZW, JW, JC, DT), pp. 985–993.
KDDKDD-2012-XieWLY #overview
Review spam detection via temporal pattern discovery (SX, GW, SL, PSY), pp. 823–831.
KDDKDD-2012-XingLHCHLLMZ #behaviour #chat #online #scalability #video
Scalable misbehavior detection in online video chat services (XX, YLL, SH, HC, RH, QL, XL, SM, YZ), pp. 552–560.
KDDKDD-2012-ZhangY #bound #community #matrix
Overlapping community detection via bounded nonnegative matrix tri-factorization (YZ, DYY), pp. 606–614.
KDIRKDIR-2012-HaanR
Detecting Temporally Related Arithmetical Patterns — An Extension of Complex Event Processing (RdH, MR), pp. 329–332.
KDIRKDIR-2012-LemnaruTCP #case study #classification #hybrid #network #problem
A Hybrid Solution for Imbalanced Classification Problems — Case Study on Network Intrusion Detection (CL, ATV, AC, RP), pp. 348–352.
KDIRKDIR-2012-SantosGSK #behaviour #finite
Finite Belief Fusion Model for Hidden Source Behavior Change Detection (ESJ, QG, EES, JK), pp. 17–24.
KEODKEOD-2012-FukumotoST #multi #summary #topic
Topic and Subject Detection in News Streams for Multi-document Summarization (FF, YS, AT), pp. 166–171.
MLDMMLDM-2012-GlodekSP #process #recognition
Detecting Actions by Integrating Sequential Symbolic and Sub-symbolic Information in Human Activity Recognition (MG, FS, GP), pp. 394–404.
MLDMMLDM-2012-MaiorcaGC #pattern matching #pattern recognition #recognition
A Pattern Recognition System for Malicious PDF Files Detection (DM, GG, IC), pp. 510–524.
MLDMMLDM-2012-SyarifZPW
Application of Bagging, Boosting and Stacking to Intrusion Detection (IS, EZ, APB, GW), pp. 593–602.
SEKESEKE-2012-GallegosG #tool support
Tool Support for Anomaly Detection in Scientific Sensor Data (IG, AQG), pp. 678–683.
SEKESEKE-2012-MireslamiMF #behaviour #distributed
Detecting Emergent Behavior in Distributed Systems Caused by Overgeneralization (SM, MM, BHF), pp. 70–73.
SEKESEKE-2012-WangZWZZ #component #online
Online Anomaly Detection for Components in OSGi-based Software (TW, WZ, JW, JZ, HZ), pp. 188–193.
SIGIRSIGIR-2012-AlasiryLP #query
Detecting candidate named entities in search queries (AA, ML, AP), pp. 1049–1050.
SIGIRSIGIR-2012-JiangWLAW #alias #approach #learning #similarity #string #towards
Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
SIGIRSIGIR-2012-Najork #scalability #web
Detecting quilted web pages at scale (MN), pp. 385–394.
SIGIRSIGIR-2012-NishidaHF #classification #probability #twitter #word
Improving tweet stream classification by detecting changes in word probability (KN, TH, KF), pp. 971–980.
SIGIRSIGIR-2012-ZhangWDH #learning #performance #reuse
Learning hash codes for efficient content reuse detection (QZ, YW, ZD, XH), pp. 405–414.
MODELSMoDELS-2012-FariasGL #aspect-oriented #consistency #empirical #nondeterminism
Evaluating the Impact of Aspects on Inconsistency Detection Effort: A Controlled Experiment (KF, AG, CJPdL), pp. 219–234.
MODELSMoDELS-2012-JacksonSB #constraints #declarative #fault #specification
Detecting Specification Errors in Declarative Languages with Constraints (EKJ, WS, NB), pp. 399–414.
ECOOPECOOP-2012-XuYR #data type #invariant #static analysis
Static Detection of Loop-Invariant Data Structures (G(X, DY, AR), pp. 738–763.
OOPSLAOOPSLA-2012-Effinger-DeanLCGB #concurrent #named
IFRit: interference-free regions for dynamic data-race detection (LED, BL, LC, DG, HJB), pp. 467–484.
OOPSLAOOPSLA-2012-LucasER #distributed #problem #sequence
Detecting problematic message sequences and frequencies in distributed systems (CL, SGE, DSR), pp. 915–926.
TOOLSTOOLS-EUROPE-2012-OlszakBJV #quantifier
Detection of Seed Methods for Quantification of Feature Confinement (AO, EB, BNJ, JV), pp. 252–268.
PLDIPLDI-2012-JinSSSL #comprehension #debugging #performance
Understanding and detecting real-world performance bugs (GJ, LS, XS, JS, SL), pp. 77–88.
PLDIPLDI-2012-NagarakatteBMM #concurrent #debugging #manycore
Multicore acceleration of priority-based schedulers for concurrency bug detection (SN, SB, MMKM, MM), pp. 543–554.
PLDIPLDI-2012-PetrovVSD #concurrent #web
Race detection for web applications (BP, MTV, MS, JD), pp. 251–262.
PLDIPLDI-2012-PradelG #automation #concurrent #precise #safety #thread
Fully automatic and precise detection of thread safety violations (MP, TRG), pp. 521–530.
PLDIPLDI-2012-RamanZSVY #concurrent #parallel #precise #scalability
Scalable and precise dynamic datarace detection for structured parallelism (RR, JZ, VS, MTV, EY), pp. 531–542.
POPLPOPL-2012-SmaragdakisESYF #concurrent #polynomial #predict
Sound predictive race detection in polynomial time (YS, JE, CS, JY, CF), pp. 387–400.
RERE-2012-FerrariG #using
Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
RERE-2012-KnaussDPC #requirements
Detecting and classifying patterns of requirements clarifications (EK, DD, GPC, JCH), pp. 251–260.
RERE-2012-YangRGWN #automation #natural language #nondeterminism #requirements
Speculative requirements: Automatic detection of uncertainty in natural language requirements (HY, ANDR, VG, AW, BN), pp. 11–20.
ASEASE-2012-MaigaABSGAA #anti
Support vector machines for anti-pattern detection (AM, NA, NB, AS, YGG, GA, EA), pp. 278–281.
ASEASE-2012-NguyenNNLS #debugging #information retrieval #modelling #topic
Duplicate bug report detection with a combination of information retrieval and topic modeling (ATN, TTN, TNN, DL, CS), pp. 70–79.
ASEASE-2012-NguyenNNNN #embedded #smell #web
Detection of embedded code smells in dynamic web applications (HVN, HAN, TTN, ATN, TNN), pp. 282–285.
ASEASE-2012-NguyenVLG #framework #knowledge-based #named #requirements
REInDetector: a framework for knowledge-based requirements engineering (THN, BQV, ML, JG), pp. 386–389.
ASEASE-2012-ThungLLJRD #debugging #empirical #fault #tool support #what
To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools (FT, L, DL, LJ, FR, PTD), pp. 50–59.
ASEASE-2012-YuanG #approach #clone detection #named #scalability
Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
FSEFSE-2012-KwonS #component
Detecting and analyzing insecure component usage (TK, ZS), p. 5.
ICSEICSE-2012-Blincoe12a #collaboration #coordination #developer #requirements
Timely detection of Coordination Requirements to support collaboration among software developers (KB), pp. 1601–1603.
ICSEICSE-2012-CaiC #concurrent #named #scalability
MagicFuzzer: Scalable deadlock detection for large-scale applications (YC, WKC), pp. 606–616.
ICSEICSE-2012-GuimaraesS
Improving early detection of software merge conflicts (MLG, ARS), pp. 342–352.
ICSEICSE-2012-HermansPD #smell #spreadsheet #visualisation
Detecting and visualizing inter-worksheet smells in spreadsheets (FH, MP, AvD), pp. 441–451.
ICSEICSE-2012-LiE #named
CBCD: Cloned buggy code detector (JL, MDE), pp. 310–320.
ICSEICSE-2012-McMillanGP
Detecting similar software applications (CM, MG, DP), pp. 364–374.
ICSEICSE-2012-MollerS #automation
Automated detection of client-state manipulation vulnerabilities (AM, MS), pp. 749–759.
ICSEICSE-2012-NguyenNNN #named #web
BabelRef: Detection and renaming tool for cross-language program entities in dynamic web applications (HVN, HAN, TTN, TNN), pp. 1391–1394.
ICSEICSE-2012-PradelG #automation #debugging #generative #mining #specification #testing
Leveraging test generation and specification mining for automated bug detection without false positives (MP, TRG), pp. 288–298.
ICSEICSE-2012-RoehmM #automation #developer #development #problem #process
Automatically detecting developer activities and problems in software development work (TR, WM), pp. 1261–1264.
ICSEICSE-2012-SiegmundKKABRS #automation #performance #predict
Predicting performance via automated feature-interaction detection (NS, SSK, CK, SA, DSB, MR, GS), pp. 167–177.
ICSEICSE-2012-SongT12a #debugging #metadata #on the fly
Detecting metadata bugs on the fly (MS, ET), pp. 1455–1456.
ICSEICSE-2012-ZhengZ #problem #static analysis
Static detection of resource contention problems in server-side scripts (YZ, XZ), pp. 584–594.
SACSAC-2012-AtifMO #verification
Formal verification of Unreliable Failure Detectors in Partially Synchronous Systems (MA, MRM, AO), pp. 478–485.
SACSAC-2012-ChengZQ #fine-grained #topic
Fine-grained topic detection in news search results (JC, JZ, SQ), pp. 912–917.
SACSAC-2012-MakanjuZML #clustering #composition #identification
Spatio-temporal decomposition, clustering and identification for alert detection in system logs (AM, ANZH, EEM, ML), pp. 621–628.
SACSAC-2012-MannS #android #framework #privacy #static analysis
A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
SACSAC-2012-MoraisC #ad hoc #distributed #network
A distributed intrusion detection scheme for wireless ad hoc networks (ANPM, ARC), pp. 556–562.
SACSAC-2012-OyamaGCSK
Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
SACSAC-2012-Pizzuti #algorithm #community #composition #search-based
Boosting the detection of modular community structure with genetic algorithms and local search (CP), pp. 226–231.
SACSAC-2012-SchluterC #correlation #markov #modelling #predict #using
Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
CASECASE-2012-Chang #fault #feature model #process #using
Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
CASECASE-2012-DinhamF #using
Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
CASECASE-2012-IdenP #algorithm #aspect-oriented #functional #safety
Functional safety aspects of pattern detection algorithms (JI, CIP), pp. 747–752.
CASECASE-2012-JungCKM #using
Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
CASECASE-2012-KanY
Dynamic spatiotemporal warping for the detection and location of myocardial infarctions (CK, HY), pp. 1046–1051.
CASECASE-2012-KimKS #algorithm #recognition #using
Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
CASECASE-2012-KimSCKY #automation #image
Image and sensor los-based automatic horizontal line detection and tracking for infrared search and track (SK, MSS, BC, JK, YY), pp. 718–723.
CASECASE-2012-KimYSP #using #visual notation
Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
CASECASE-2012-WeiZW #recognition #research
Research on a detection and recognition method of tactile-slip sensation used to control the Elderly-assistant & Walking-assistant Robot (XW, XZ, YW), pp. 1040–1045.
CCCC-2012-KwonS #component #static analysis
Static Detection of Unsafe Component Loadings (TK, ZS), pp. 122–143.
CGOCGO-2012-ZouR #parallel #source code
Scan detection and parallelization in “inherently sequential” nested loop programs (YZ, SVR), pp. 74–83.
DACDAC-2012-CropPC #logic #throughput #using
Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
DACDAC-2012-GuoK #concurrent #encryption #fault #standard
Invariance-based concurrent error detection for advanced encryption standard (XG, RK), pp. 573–578.
DACDAC-2012-HuangHRBK #embedded #fault tolerance #towards
Towards fault-tolerant embedded systems with imperfect fault detection (JH, KH, AR, CB, AK), pp. 188–196.
DACDAC-2012-LinHFHM #debugging #effectiveness #validation
Quick detection of difficult bugs for effective post-silicon validation (DL, TH, FF, NH, SM), pp. 561–566.
DACDAC-2012-YuCSJC #design #using
Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
DATEDATE-2012-CampagnaV #architecture #fault #hybrid #validation
An hybrid architecture to detect transient faults in microprocessors: An experimental validation (SC, MV), pp. 1433–1438.
DATEDATE-2012-LiDT #authentication #framework #hardware #self
A sensor-assisted self-authentication framework for hardware trojan detection (ML, AD, MT), pp. 1331–1336.
DATEDATE-2012-MarinissenVGHRMB #process
EDA solutions to new-defect detection in advanced process technologies (EJM, GV, SKG, FH, JR, NM, SB), pp. 123–128.
PDPPDP-2012-CastilloFC #algorithm #complexity #concurrent #linear
A Dynamic Deadlock Detection/Resolution Algorithm with Linear Message Complexity (MC, FF, AC), pp. 175–179.
PDPPDP-2012-KharbasKHM
Assessing HPC Failure Detectors for MPI Jobs (KK, DK, TH, FM), pp. 81–88.
PPoPPPPoPP-2012-HoeflerS #optimisation
Communication-centric optimizations by dynamically detecting collective operations (TH, TS), pp. 305–306.
FASEFASE-2012-MahouachiKG #classification #design #fault
A New Design Defects Classification: Marrying Detection and Correction (RM, MK, KG), pp. 455–470.
TACASTACAS-2012-SongT #automaton #model checking
Pushdown Model Checking for Malware Detection (FS, TT), pp. 110–125.
CAVCAV-2012-ArltS #java #named
Joogie: Infeasible Code Detection for Java (SA, MS), pp. 767–773.
CAVCAV-2012-AtigBEL #parallel #source code #thread
Detecting Fair Non-termination in Multithreaded Programs (MFA, AB, ME, AL), pp. 210–226.
ICSTICST-2012-ChoudharyPO #crawling #difference #named #web
CrossCheck: Combining Crawling and Differencing to Better Detect Cross-browser Incompatibilities in Web Applications (SRC, MRP, AO), pp. 171–180.
ICSTICST-2012-DucheneGRR #fuzzing #model inference #using
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
ICSTICST-2012-Nguyen #comprehension #performance #scalability #using
Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
ICSTICST-2012-TanMTL #consistency #nondeterminism #testing
@tComment: Testing Javadoc Comments to Detect Comment-Code Inconsistencies (SHT, DM, LT, GTL), pp. 260–269.
ICTSSICTSS-2012-SantosA #automation #fault #lightweight #monitoring
Lightweight Automatic Error Detection by Monitoring Collar Variables (JS, RA), pp. 215–230.
ISSTAISSTA-2012-AlshahwanH #fault #testing #web
State aware test case regeneration for improving web application test suite coverage and fault detection (NA, MH), pp. 45–55.
ISSTAISSTA-2012-CaballeroGMN #named #pointer
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
ISSTAISSTA-2012-CanaliLBKCK
A quantitative study of accuracy in system call-based malware detection (DC, AL, DB, CK, MC, EK), pp. 122–132.
ISSTAISSTA-2012-LiRCS #debugging #precise #predict
Residual investigation: predictive and precise bug detection (KL, CR, CC, YS), pp. 298–308.
ISSTAISSTA-2012-PradelHG #parametricity #static analysis #type system
Static detection of brittle parameter typing (MP, SH, TRG), pp. 265–275.
ISSTAISSTA-2012-SuiYX #analysis #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
ISSTAISSTA-2012-TombF #analysis #consistency #nondeterminism #reachability
Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
ISSTAISSTA-2012-ZhangJWLZ #algorithm #towards
A first step towards algorithm plagiarism detection (FZ, YcJ, DW, PL, SZ), pp. 111–121.
QoSAQoSA-ISARCS-2011-DettenB #clustering #component #re-engineering
Combining clustering and pattern detection for the reengineering of component-based software systems (MvD, SB), pp. 23–32.
DocEngDocEng-2011-GippM #algorithm #pattern matching #sequence
Citation pattern matching algorithms for citation-based plagiarism detection: greedy citation tiling, citation chunking and longest common citation sequence (BG, NM), pp. 249–258.
DocEngDocEng-2011-KarolNKAM #adaptation #aspect-oriented #multi #xml
Detecting and resolving conflicts between adaptation aspects in multi-staged XML transformations (SK, MN, DK, UA, KM), pp. 229–238.
DRRDRR-2011-KavallieratouLC
Ruling line detection and removal (EK, DPL, JC), pp. 1–10.
DRRDRR-2011-LiuZ11a #documentation #effectiveness
A simple and effective figure caption detection system for old-style documents (ZL, HZ), pp. 1–10.
HTHT-2011-StewartSN #approach #social #social media
A transfer approach to detecting disease reporting events in blog social media (AS, MS, WN), pp. 271–280.
ICDARICDAR-2011-ChenL #documentation
Table Detection in Noisy Off-line Handwritten Documents (JC, DPL), pp. 399–403.
ICDARICDAR-2011-ChenL11a #algorithm #documentation #modelling
A Model-Based Ruling Line Detection Algorithm for Noisy Handwritten Documents (JC, DPL), pp. 404–408.
ICDARICDAR-2011-CoatesCCSSWWN #image #learning #recognition
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning (AC, BC, CC, SS, BS, TW, DJW, AYN), pp. 440–445.
ICDARICDAR-2011-DuAL #performance
Dot Text Detection Based on FAST Points (YD, HA, SL), pp. 435–439.
ICDARICDAR-2011-FangGBQTT #documentation #multi #visual notation
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures (JF, LG, KB, RQ, XT, ZT), pp. 779–783.
ICDARICDAR-2011-GhoshC #identification #image
Composite Script Identification and Orientation Detection for Indian Text Images (SG, BBC), pp. 294–298.
ICDARICDAR-2011-GleichmanOGMBP #alias #image #segmentation
Detection and Segmentation of Antialiased Text in Screen Images (SG, BO, AG, MM, EB, EP), pp. 424–428.
ICDARICDAR-2011-KunishigeFU
Scenery Character Detection with Environmental Context (YK, YF, SU), pp. 1049–1053.
ICDARICDAR-2011-LeeLLYK
AdaBoost for Text Detection in Natural Scene (JJL, PHL, SWL, ALY, CK), pp. 429–434.
ICDARICDAR-2011-LiuLZL #image #novel
A Novel Italic Detection and Rectification Method for Chinese Advertising Images (JL, HL, SZ, WL), pp. 698–702.
ICDARICDAR-2011-MicenkovaB #documentation #image
Stamp Detection in Color Document Images (BM, JvB), pp. 1125–1129.
ICDARICDAR-2011-PanZSN11a #adaptation #segmentation #verification
Improving Scene Text Detection by Scale-Adaptive Segmentation and Weighted CRF Verification (YFP, YZ, JS, SN), pp. 759–763.
ICDARICDAR-2011-PapandreouG #novel
A Novel Skew Detection Technique Based on Vertical Projections (AP, BG), pp. 384–388.
ICDARICDAR-2011-PhamDB
A Contour-Based Method for Logo Detection (TAP, MD, SB), pp. 718–722.
ICDARICDAR-2011-UchidaSKF #approach #towards
A Keypoint-Based Approach toward Scenery Character Detection (SU, YS, YK, YF), pp. 819–823.
ICDARICDAR-2011-WeberLSSSD #evaluation #interface #multi #online
MCS for Online Mode Detection: Evaluation on Pen-Enabled Multi-touch Interfaces (MW, ML, YTHS, CS, FS, AD), pp. 957–961.
ICDARICDAR-2011-YinHSN #documentation #robust
Robust Vanishing Point Detection for MobileCam-Based Documents (XCY, HWH, JS, SN), pp. 136–140.
ICDARICDAR-2011-YiT #image #word
Text Detection in Natural Scene Images by Stroke Gabor Words (CY, YT), pp. 177–181.
ICDARICDAR-2011-YouADGT #using
Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
ICDARICDAR-2011-ZhaoLL #independence #robust
A Robust Color-Independent Text Detection Method from Complex Videos (YZ, TL, WL), pp. 374–378.
JCDLJCDL-2011-GippMB #comparative #evaluation #using
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag (BG, NM, JB), pp. 255–258.
JCDLJCDL-2011-PanM
Event detection with spatial latent Dirichlet allocation (CCP, PM), pp. 349–358.
JCDLJCDL-2011-PapadakisGNPN #evolution
Detecting and exploiting stability in evolving heterogeneous information spaces (GP, GG, CN, TP, WN), pp. 95–104.
JCDLJCDL-2011-YuanWLW #video
A new video text detection method (JY, BW, WL, LW), pp. 359–362.
SIGMODSIGMOD-2011-AlvanakiMRW #named #topic #web
EnBlogue: emergent topic detection in web 2.0 streams (FA, SM, KR, GW), pp. 1271–1274.
SIGMODSIGMOD-2011-DongS #scalability
Large-scale copy detection (XLD, DS), pp. 1205–1208.
VLDBVLDB-2011-BorisovB #approach #declarative #towards
Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
VLDBVLDB-2011-JinLLH #data mining #named #network #social #social media
SocialSpamGuard: A Data Mining-Based Spam Detection System for Social Media Networks (XJ, CXL, JL, JH), pp. 1458–1461.
VLDBVLDB-2011-KaushikR #named
Whodunit: An Auditing Tool for Detecting Data Breaches (RK, RR), pp. 1410–1413.
SCAMSCAM-J-2009-TiarksKF11 #assessment #state of the art #tool support
An extended assessment of type-3 clones as detected by state-of-the-art tools (RT, RK, RF), pp. 295–331.
CSMRCSMR-2011-FreyH #architecture #constraints #legacy #migration
An Extensible Architecture for Detecting Violations of a Cloud Environment’s Constraints during Legacy Software System Migration (SF, WH), pp. 269–278.
CSMRCSMR-2011-HigoK #clone detection #dependence #heuristic
Code Clone Detection on Specialized PDGs with Heuristics (YH, SK), pp. 75–84.
CSMRCSMR-2011-KessentiniSBW #design #fault #generative #music
Design Defect Detection Rules Generation: A Music Metaphor (MK, HAS, MB, MW), pp. 241–248.
ICPCICPC-2011-Cordy #clone detection #incremental #scalability #similarity #using
Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
ICPCICPC-2011-CordyR11a #clone detection
The NiCad Clone Detector (JRC, CKR), pp. 219–220.
ICPCICPC-2011-HuangW #monitoring #process
Anomaly Detection by Monitoring Filesystem Activities (LH, KW), pp. 221–222.
ICPCICPC-2011-KessentiniKSBO #design #fault
Design Defects Detection and Correction by Example (MK, WK, HAS, MB, AO), pp. 81–90.
ICSMEICSM-2011-JiresalCN #cobol #precise #scalability #source code
Precise detection of un-initialized variables in large, real-life COBOL programs in presence of unrealizable paths (RJ, AC, RN), pp. 448–456.
ICSMEICSM-2011-KuhnK #combinator #fault #testing
Practical combinatorial (t-way) methods for detecting complex faults in regression testing (RK, RK), p. 599.
ICSMEICSM-2011-Roover #logic #metaprogramming #object-oriented #source code
A logic meta-programming foundation for example-driven pattern detection in object-oriented programs (CDR), pp. 556–561.
ICSMEICSM-2011-SunKZ #api #graph #library
Graph-based detection of library API imitations (CS, SCK, SJZ), pp. 183–192.
MSRMSR-2011-BiegelSHDD #comparison #metric #refactoring #similarity
Comparison of similarity metrics for refactoring detection (BB, QDS, WH, SD, SD), pp. 53–62.
MSRMSR-2011-HemelKVD #clone detection
Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
MSRMSR-2011-Zhou #debugging #problem
Connecting technology with real-world problems — from copy-paste detection to detecting known bugs: (YZ), p. 2.
PASTEPASTE-2011-Detten #behaviour #execution #generative #symbolic computation #towards
Towards systematic, comprehensive trace generation for behavioral pattern detection through symbolic execution (MvD), pp. 17–20.
WCREWCRE-2011-HigoUNK #approach #clone detection #incremental
Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
WCREWCRE-2011-UddinRSH #effectiveness #on the #scalability
On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems (MSU, CKR, KAS, AH), pp. 13–22.
CIAACIAA-2011-FelscherT #composition
Compositional Failure Detection in Structured Transition Systems (IF, WT), pp. 130–141.
AIIDEAIIDE-2011-FujitaIM #network #using
Detecting Real Money Traders in MMORPG by Using Trading Network (AF, HI, HM).
CoGCIG-2011-GalliLCL #approach #framework #machine learning
A cheating detection framework for Unreal Tournament III: A machine learning approach (LG, DL, LC, PLL), pp. 266–272.
FDGFDG-2011-CanossaDS #exclamation
Arrrgghh!!!: blending quantitative and qualitative methods to detect player frustration (AC, AD, JRMS), pp. 61–68.
FDGFDG-2011-HaleY #navigation #using
Using navigation meshes for collision detection (DHH, GMY), pp. 316–318.
CHICHI-2011-KarueiMFMKE #mobile
Detecting vibrations across the body in mobile contexts (IK, KEM, ZFF, RM, SK, MEZ), pp. 3267–3276.
CHICHI-2011-KoZ #feedback #web
Feedlack detects missing feedback in web applications (AJK, XZ), pp. 2177–2186.
HCIDUXU-v2-2011-TamirKMVLJ #usability
Detection of Software Usability Deficiencies (DET, OVK, CJM, DKDV, GRL, AMJ), pp. 527–536.
HCIHCI-DDA-2011-MiyazakiNI #image
A Detection Method of Basic Mouth Shapes from Japanese Utterance Images (TM, TN, NI), pp. 608–617.
HCIHCI-DDA-2011-ZaragozaRBBMCR
A User-Friendly Tool for Detecting the Stress Level in a Person’s Daily Life (IZ, BR, CB, RMB, IM, DC, MAR), pp. 423–431.
HCIHCI-ITE-2011-AbeOO #analysis #image
Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
HCIHCI-ITE-2011-KimRH #multi #recognition
A Method of Multiple Odors Detection and Recognition (DKK, YWR, KSH), pp. 464–473.
HCIHCI-MIIE-2011-CostaFVCBH #navigation #people #visual notation
Landmarks Detection to Assist the Navigation of Visually Impaired People (PC, HF, VV, PC, JB, LJH), pp. 293–300.
HCIHCI-MIIE-2011-OehlSTHP #approach #human-computer #interactive
Improving Human-Machine Interaction — A Non Invasive Approach to Detect Emotions in Car Drivers (MO, FWS, TKT, RH, HRP), pp. 577–585.
HCIHIMI-v1-2011-TogawaKY #communication #network #peer-to-peer #using #visualisation
Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
ICEISICEIS-v2-2011-BaiW #fuzzy #identification #multi
Applying Fuzzy Multiple Criteria Decision Making to Evaluate and Identify Optimal Explosive Detection Equipments (YB, DW), pp. 118–124.
CIKMCIKM-2011-AnderkaSL #classification #problem #quality
Detection of text quality flaws as a one-class classification problem (MA, BS, NL), pp. 2313–2316.
CIKMCIKM-2011-BingLG #segmentation #towards
Towards a unified solution: data record region detection and segmentation (LB, WL, YG), pp. 1265–1274.
CIKMCIKM-2011-DavisLMR #graph
Detecting anomalies in graphs with numeric labels (MD, WL, PCM, GR), pp. 1197–1202.
CIKMCIKM-2011-HagenSR #query
Query session detection as a cascade (MH, BS, TR), pp. 147–152.
CIKMCIKM-2011-KasiviswanathanMBS #learning #taxonomy #topic #using
Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
CIKMCIKM-2011-LeeCCS #social #social media
Content-driven detection of campaigns in social media (KL, JC, ZC, DZS), pp. 551–556.
CIKMCIKM-2011-LeitaoC #optimisation
Duplicate detection through structure optimization (LL, PC), pp. 443–452.
CIKMCIKM-2011-MirzaCCHH #process
Switch detector: an activity spotting system for desktop (HTM, LC, GC, IH, XH), pp. 2285–2288.
CIKMCIKM-2011-ParkL #data type #evaluation #query
A continuous query evaluation scheme for a detection-only query over data streams (HKP, WSL), pp. 2405–2408.
CIKMCIKM-2011-PillutlaRBSJ #distributed
LSH based outlier detection and its application in distributed setting (MRP, NR, PB, KS, CVJ), pp. 2289–2292.
CIKMCIKM-2011-ShiYCYW #community #multi #on the
On selection of objective functions in multi-objective community detection (CS, PSY, YC, ZY, BW), pp. 2301–2304.
CIKMCIKM-2011-SoodL #probability #using
Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
CIKMCIKM-2011-Stamatatos
Plagiarism detection based on structural information (ES), pp. 1221–1230.
CIKMCIKM-2011-VarolCAK #corpus #named
CoDet: sentence-based containment detection in news corpora (EV, FC, CA, OK), pp. 2049–2052.
CIKMCIKM-2011-WatanabeOOO #microblog #named #realtime
Jasmine: a real-time local-event detection system based on geolocation information propagated to microblogs (KW, MO, MO, RO), pp. 2541–2544.
CIKMCIKM-2011-YalnizCM #scalability
Partial duplicate detection for large book collections (IZY, EFC, RM), pp. 469–474.
CIKMCIKM-2011-ZhangYCT
A machine-learned proactive moderation system for auction fraud detection (LZ, JY, WC, BLT), pp. 2501–2504.
KDDKDD-2011-BhaduriMG #algorithm
Algorithms for speeding up distance-based outlier detection (KB, BLM, CG), pp. 859–867.
KDDKDD-2011-ChattopadhyayYPFD #adaptation #multi
Multi-source domain adaptation and its application to early detection of fatigue (RC, JY, SP, WF, ID), pp. 717–725.
KDDKDD-2011-ChenRT #adaptation #incremental #learning
Detecting bots via incremental LS-SVM learning with dynamic feature adaptation (FC, SR, PNT), pp. 386–394.
KDDKDD-2011-GabburPFT #approach
A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
KDDKDD-2011-GhaniK #fault #interactive #learning
Interactive learning for efficiently detecting errors in insurance claims (RG, MK), pp. 325–333.
KDDKDD-2011-KaufmanRP #data mining #mining
Leakage in data mining: formulation, detection, and avoidance (SK, SR, CP), pp. 556–563.
KDDKDD-2011-LiL #behaviour #community #framework #generative #modelling #network #simulation #social
Social flocks: a crowd simulation framework for social network generation, community detection, and collective behavior modeling (CTL, SDL), pp. 765–768.
KDDKDD-2011-SculleyOPSHZ
Detecting adversarial advertisements in the wild (DS, MEO, MP, BS, JH, YZ), pp. 274–282.
KDDKDD-2011-YeLZZTGA
Combining file content and file relations for cloud based malware detection (YY, TL, SZ, WZ, ET, UG, MA), pp. 222–230.
KDIRKDIR-2011-GeraciM #algorithm #multi #web
A Multi-sequence Alignment Algorithm for Web Template Detection (FG, MM), pp. 121–128.
KDIRKDIR-2011-MallJP #correlation
Detecting Correlations between Hot Days in News Feeds (RM, NJ, VP), pp. 375–378.
KDIRKDIR-2011-MartelotH #algorithm #community #multi #optimisation #using
Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
KEODKEOD-2011-HmidaCBN #3d #approach #ontology #semantics
From 3D Point Clouds to Semantic Objects — An Ontology-based Detection Approach (HBH, CC, FB, CN), pp. 255–260.
MLDMMLDM-2011-AlshukriCZ #bound #incremental #random #using
Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
MLDMMLDM-2011-ChenHCS #email #similarity
Authorship Similarity Detection from Email Messages (XC, PH, RC, KPS), pp. 375–386.
MLDMMLDM-2011-HaoCCCS #adaptation #email #modelling
Adaptive Context Modeling for Deception Detection in Emails (PH, XC, NC, RC, KPS), pp. 458–468.
MLDMMLDM-2011-PerezR #array #using
Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
MLDMMLDM-2011-SahaDR #community #network
Detection of Communities and Bridges in Weighted Networks (TS, CD, HR), pp. 584–598.
MLDMMLDM-2011-WuW #category theory
Parameter-Free Anomaly Detection for Categorical Data (SW, SW), pp. 112–126.
RecSysRecSys-2011-WuCMW #learning #named
Semi-SAD: applying semi-supervised learning to shilling attack detection (ZW, JC, BM, YW), pp. 289–292.
SEKESEKE-2011-BragaD #information management #tool support #using
Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SEKESEKE-2011-BudiLLJW #architecture #automation #design
Automated Detection of Likely Design Flaws in N-Tier Architectures (AB, L, DL, LJ, SW), pp. 613–618.
SEKESEKE-2011-MoserWHB #analysis #automation #empirical #requirements #semantics
Automating the Detection of Complex Semantic Conflicts between Software Requirements (An empirical study on requirements conflict analysis with semantic technology) (TM, DW, MH, SB), pp. 729–735.
SEKESEKE-2011-SunHGZWY #novel #petri net #using
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SEKESEKE-2011-ZhangSSCM #design pattern
Detecting Architecture Erosion by Design Decision of Architectural Pattern (LZ, YS, HS, FC, HM), pp. 758–763.
SIGIRSIGIR-2011-AktolgaRA
Detecting outlier sections in us congressional legislation (EA, IR, YA), pp. 235–244.
SIGIRSIGIR-2011-AminiU #automation #learning #multi #summary
Transductive learning over automatically detected themes for multi-document summarization (MRA, NU), pp. 1193–1194.
SIGIRSIGIR-2011-GuoYA #interactive #mobile
Detecting success in mobile search from interaction (QG, SY, EA), pp. 1229–1230.
SIGIRSIGIR-2011-JijkounR
Bootstrapping subjectivity detection (VJ, MdR), pp. 1125–1126.
SIGIRSIGIR-2011-Shokouhi #analysis #query
Detecting seasonal queries by time-series analysis (MS), pp. 1171–1172.
BXBX-2011-Boronat #consistency #maude #modelling #nondeterminism #specification #using
Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
ECMFAECMFA-2011-BarrettCB
Table-Driven Detection and Resolution of Operation-Based Merge Conflicts with Mirador (SB, PC, GB), pp. 329–344.
ECMFAECMFA-2011-NoirDESB #case study #consistency #experience #nondeterminism #representation
Operation Based Model Representation: Experiences on Inconsistency Detection (JLN, OD, DE, MAAdS, XB), pp. 85–96.
MODELSMoDELS-2011-Al-BatranSH #clone detection #development #embedded #modelling #semantics
Semantic Clone Detection for Model-Based Development of Embedded Systems (BAB, BS, BH), pp. 258–272.
MODELSMoDELS-2011-JensenCGN #behaviour
A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
ECOOPECOOP-2011-CarbinMKR #infinity
Detecting and Escaping Infinite Loops with Jolt (MC, SM, MK, MCR), pp. 609–633.
OOPSLAOOPSLA-2011-JovicAH #debugging #performance
Catch me if you can: performance bug detection in the wild (MJ, AA, MH), pp. 155–170.
OOPSLAOOPSLA-2011-LiSD #analysis #concurrent #named
SOS: saving time in dynamic race detection with stationary analysis (DL, WSa, MBD), pp. 35–50.
OOPSLAOOPSLA-2011-LiuB #automation #named #precise
SHERIFF: precise detection and automatic mitigation of false sharing (TL, EDB), pp. 3–18.
AdaEuropeAdaEurope-2011-RazaFP #fault #parallel #source code
Detecting High-Level Synchronization Errors in Parallel Programs (SAR, SF, EP), pp. 17–30.
LOPSTRLOPSTR-2011-DandoisV #how #logic programming #source code
Clones in Logic Programs and How to Detect Them (CD, WV), pp. 90–105.
PADLPADL-2011-ChristakisS #fault #message passing #static analysis #using
Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
PADLPADL-2011-SalgueiroDBA #constraints #using
Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
PLDIPLDI-2011-SrivastavaBMS #api #implementation #multi #policy #security #using
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
ASEASE-2011-ApelSWRB #feature model #interactive #using #verification
Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
ASEASE-2011-Haiduc #automation #concept #quality #query
Automatically detecting the quality of the query and its implications in IR-based concept location (SH), pp. 637–640.
ASEASE-2011-RasoolM #design pattern #flexibility
Flexible design pattern detection based on feature types (GR, PM), pp. 243–252.
ASEASE-2011-YuTN #source code #specification
Specifying and detecting meaningful changes in programs (YY, TTT, BN), pp. 273–282.
ESEC-FSEESEC-FSE-2011-BrunHEN #collaboration
Proactive detection of collaboration conflicts (YB, RH, MDE, DN), pp. 168–178.
ICSEICSE-2011-Bertran #architecture #evolution #smell
Detecting architecturally-relevant code smells in evolving software systems (IMB), pp. 1090–1093.
ICSEICSE-2011-Choudhary #web
Detecting cross-browser issues in web applications (SRC), pp. 1146–1148.
ICSEICSE-2011-GenevesL #consistency #ide #xml
Inconsistent path detection for XML IDEs (PG, NL), pp. 983–985.
ICSEICSE-2011-JhiWJZLW
Value-based program characterization and its application to software plagiarism detection (YcJ, XW, XJ, SZ, PL, DW), pp. 756–765.
ICSEICSE-2011-KimJKY #clone detection #memory management #named
MeCC: memory comparison-based clone detector (HK, YJ, SK, KY), pp. 301–310.
ICSEICSE-2011-MatthijssenZ #ajax #comprehension #interactive #named
FireDetective: understanding ajax client/server interactions (NM, AZ), pp. 998–1000.
ICSEICSE-2011-ShengVEHCZ #concurrent #lightweight #named
RACEZ: a lightweight and non-invasive race detection tool for production applications (TS, NV, SE, RH, WC, WZ), pp. 401–410.
ICSEICSE-2011-SridharaPV #automation
Automatically detecting and describing high level actions within methods (GS, LLP, KVS), pp. 101–110.
ICSEICSE-2011-TanZP #concurrent #debugging #mining #named
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs (LT, YZ, YP), pp. 11–20.
ICSEICSE-2011-WongCKD #composition
Detecting software modularity violations (SW, YC, MK, MD), pp. 411–420.
SACSAC-2011-BhaskaranNFG #behaviour #learning #online
Deceit detection via online behavioral learning (NB, IN, MGF, VG), pp. 29–30.
SACSAC-2011-FontesNPC #architecture #learning #problem
An agent-based architecture for supporting the workgroups creation and the detection of out-of-context conversation on problem-based learning in virtual learning environments (LMdOF, FMMN, AÁAP, GALdC), pp. 1175–1180.
SACSAC-2011-FontugneF #adaptation
A Hough-transform-based anomaly detector with an adaptive time interval (RF, KF), pp. 471–477.
SACSAC-2011-HuangH #markov #multi #semantics
Semantic event detection in baseball videos based on a multi-output hidden Markov model (YFH, JJH), pp. 929–936.
SACSAC-2011-KaoYYC
A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs (KFK, THY, WSY, HHC), pp. 32–36.
SACSAC-2011-KimuraEFYN #behaviour #motivation #named #persuasion #smarttech #using
iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
SACSAC-2011-Mammar #approach #c #overview
An overview of a proof-based approach to detecting C vulnerabilities (AM), pp. 1343–1344.
SACSAC-2011-WangZ #performance #web
High-speed web attack detection through extracting exemplars from HTTP traffic (WW, XZ), pp. 1538–1543.
SACSAC-2011-ZhangZZZX #learning #web
Harmonic functions based semi-supervised learning for web spam detection (WZ, DZ, YZ, GZ, BX), pp. 74–75.
SLESLE-2011-BastenKV #ambiguity #scalability
Ambiguity Detection: Scaling to Scannerless (BB, PK, JJV), pp. 303–323.
ASPLOSASPLOS-2011-ZhangLOSJLR #concurrent #debugging #fault #named
ConSeq: detecting concurrency bugs through sequential errors (WZ, JL, RO, JS, GJ, SL, TWR), pp. 251–264.
CASECASE-2011-BroderickAT #formal method #industrial
Anomaly detection without a pre-existing formal model: Application to an industrial manufacturing system (JAB, LVA, DMT), pp. 169–174.
CASECASE-2011-ColP #performance #recursion
Fast and accurate object detection by means of recursive monomial feature elimination and cascade of SVM (LDC, FAP), pp. 304–309.
CASECASE-2011-JasperF #performance
Fast focus-based depth detection for manipulation in scanning electron microscopes (DJ, SF), pp. 375–380.
CASECASE-2011-RatnakarZ #using
An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
CASECASE-2011-SenoussiCDZ #fault #feature model #process
Feature selection for fault detection systems: Application to the Tennessee Eastman Process (HS, BCM, MD, NZ), pp. 189–194.
CASECASE-2011-SunLOS #energy #fault
Building energy doctors: SPC and Kalman filter-based fault detection (BS, PBL, ZO, FS), pp. 333–340.
CASECASE-2011-WanY #fault
Fault detection of networked control systems utilizing limited possibilities of unknown packet transmission (YW, HY), pp. 619–624.
CGOCGO-2011-XieX #named #performance
Acculock: Accurate and efficient detection of data races (XX, JX), pp. 201–212.
DACDAC-2011-DingGYP #learning #named
AENEID: a generic lithography-friendly detailed router based on post-RET data learning and hotspot detection (DD, JRG, KY, DZP), pp. 795–800.
DACDAC-2011-LifaEP #configuration management #fault #optimisation #performance
Performance optimization of error detection based on speculative reconfiguration (AAL, PE, ZP), pp. 369–374.
DACDAC-2011-SorgenfreiS #using
Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
DACDAC-2011-YangBC #embedded #energy #fault #using
Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DACDAC-2011-ZhangDWT #composition #self
Self-aligned double patterning decomposition for overlay minimization and hot spot detection (HZ, YD, MDFW, ROT), pp. 71–76.
DATEDATE-2011-Al-DujailyMXYP #concurrent #network #runtime #transitive #using
Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
DATEDATE-2011-GizopoulosPARHSMBV #architecture #fault #manycore #online
Architectures for online error detection and recovery in multicore processors (DG, MP, SVA, PR, SKSH, DJS, AM, AB, XV), pp. 533–538.
DATEDATE-2011-HeidmannWP #architecture #throughput
Architecture and FPGA-implementation of a high throughput K+-Best detector (NH, TW, SP), pp. 240–245.
DATEDATE-2011-KaraklajicFSV #fault #low cost #using
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-KyrkouTT #hardware
Depth-directed hardware object detection (CK, CT, TT), pp. 1442–1447.
DATEDATE-2011-MadaniTCCD #energy #standard
An energy-efficient 64-QAM MIMO detector for emerging wireless standards (NMM, TT, JC, PC, WRD), pp. 246–251.
DATEDATE-2011-MaW #fault #low cost #named
LOEDAR: A low cost error detection and recovery scheme for ECC (KM, KW), pp. 1010–1015.
DATEDATE-2011-MazzilloFFMRZ
Solid state photodetectors for nuclear medical imaging applications (MM, PGF, EF, AM, MR, RZ), pp. 511–512.
DATEDATE-2011-MedwedM #fault #logic
Arithmetic logic units with high error detection rates to counteract fault attacks (MM, SM), pp. 1644–1649.
DATEDATE-2011-MotaS #testing
A true power detector for RF PA built-in calibration and testing (PFdM, JMdS), pp. 365–370.
DATEDATE-2011-PalframanKL #fault #low cost
Time redundant parity for low-cost transient error detection (DJP, NSK, MHL), pp. 52–57.
DATEDATE-2011-ZhangT #hardware #named #network
RON: An on-chip ring oscillator network for hardware Trojan detection (XZ, MT), pp. 1638–1643.
HPCAHPCA-2011-QureshiSLF #online
Practical and secure PCM systems by online detection of malicious write streams (MKQ, AS, LL, MF), pp. 478–489.
HPDCHPDC-2011-ZhouKB #debugging #locality #named #parallel #scalability #source code #using
Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
PDPPDP-2011-Csajbok #approximate #set
Simultaneous Anomaly and Misuse Intrusion Detections Based on Partial Approximative Set Theory (ZC), pp. 651–655.
PDPPDP-2011-SchmidtBGBF #in the cloud #kernel
Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments (MS, LB, PG, DB, BF), pp. 603–610.
PPoPPPPoPP-2011-ZhengRQA #gpu #named #source code
GRace: a low-overhead mechanism for detecting data races in GPU programs (MZ, VTR, FQ, GA), pp. 135–146.
SOSPSOSP-2011-LaadanVTBYN #pervasive #process
Pervasive detection of process races in deployed systems (OL, NV, CcT, CB, JY, JN), pp. 353–367.
SOSPSOSP-2011-LenersWHAW #distributed #network
Detecting failures in distributed systems with the Falcon spy network (JBL, HW, WLH, MKA, MW), pp. 279–294.
SOSPSOSP-2011-VeeraraghavanCFN #using
Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
FASEFASE-2011-KessentiniSBW #design #fault #search-based
Search-Based Design Defects Detection by Example (MK, HAS, MB, MW), pp. 401–415.
FASEFASE-2011-LiT #clone detection #erlang #incremental #source code
Incremental Clone Detection and Elimination for Erlang Programs (HL, SJT), pp. 356–370.
CAVCAV-2011-GaneshKAGHE #analysis #named #string #testing
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
ICSTICST-2011-LuoDQ #concurrent #manycore #performance
Multicore SDK: A Practical and Efficient Deadlock Detector for Real-World Applications (ZDL, RD, YQ), pp. 309–318.
ICSTICST-2011-SmithW #heuristic #sql #using #web
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICTSSICTSS-2011-MammarCJMO #c #source code #testing #using
Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ICTSSICTSS-2011-ShinboH #communication #empirical #mobile
An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services (HS, TH), pp. 195–208.
ISSTAISSTA-2011-LeS #analysis #fault #generative
Generating analyses for detecting faults in path segments (WL, MLS), pp. 320–330.
ISSTAISSTA-2011-PradelG #order
Detecting anomalies in the order of equally-typed method arguments (MP, TRG), pp. 232–242.
ICSTSAT-2011-LonsingB
Failed Literal Detection for QBF (FL, AB), pp. 259–272.
ECSAECSA-2010-ScandariatoBJ #architecture #automation
Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
DocEngDocEng-2010-ChiuCD #documentation #image
Picture detection in document page images (PC, FC, LD), pp. 211–214.
DocEngDocEng-2010-ThaoM #data type #using #version control #xml
Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
DRRDRR-2010-BeusekomRB #multi
Trainable multiscript orientation detection (JvB, YR, TMB), pp. 1–10.
DRRDRR-2010-Dejean #documentation #sequence
Numbered sequence detection in documents (HD), pp. 1–10.
DRRDRR-2010-FaureV #metric
Detection of figure and caption pairs based on disorder measurements (CF, NV), pp. 1–10.
DRRDRR-2010-LiuZ #documentation #image #learning
Semi-supervised learning for detecting text-lines in noisy document images (ZL, HZ), pp. 1–10.
DRRDRR-2010-SankarasubramaniamNVK #approach #documentation
Detecting modifications in paper documents: a coding approach (YS, BN, KV, AK), pp. 1–10.
DRRDRR-2010-ShahabKD #web
The aware toolbox for the detection of law infringements on web pages (AS, TK, AD), pp. 1–10.
DRRDRR-2010-TerradesSGVJ #predict
Interactive-predictive detection of handwritten text blocks (ORT, NS, AG, EV, AJ), pp. 1–10.
HTHT-2010-GippB #approach #identification #independence
Citation based plagiarism detection: a new approach to identify plagiarized work language independently (BG, JB), pp. 273–274.
SIGMODSIGMOD-2010-CieslewiczRSY #automation #data-driven
Automatic contention detection and amelioration for data-intensive operations (JC, KAR, KS, YY), pp. 483–494.
SIGMODSIGMOD-2010-MathioudakisK #named #twitter
TwitterMonitor: trend detection over the twitter stream (MM, NK), pp. 1155–1158.
SIGMODSIGMOD-2010-WangWLWWLTXL #dataset #named
MapDupReducer: detecting near duplicates over massive datasets (CW, JW, XL, WW, HW, HL, WT, JX, RL), pp. 1119–1122.
VLDBVLDB-2010-DongBHS
Global Detection of Complex Copying Relationships Between Sources (XD, LBE, YH, DS), pp. 1358–1369.
VLDBVLDB-2010-DongBHS10a #named
SOLOMON: Seeking the Truth Via Copying Detection (XD, LBE, YH, DS), pp. 1617–1620.
VLDBVLDB-2010-OrairTWMP
Distance-Based Outlier Detection: Consolidation and Renewed Bearing (GHO, CHCT, YW, WMJ, SP), pp. 1469–1480.
VLDBVLDB-2010-WoodsTA
Complex Event Detection at Wire Speed with FPGAs (LW, JT, GA), pp. 660–669.
VLDBVLDB-2010-YiuUST #mobile #performance #policy #proximity #self
Efficient Proximity Detection among Mobile Users via Self-Tuning Policies (MLY, LHU, SS, KT), pp. 985–996.
CSEETCSEET-2010-SharifM #design pattern #layout
The Effects of Layout on Detecting the Role of Design Patterns (BS, JIM), pp. 41–48.
EDMEDM-2010-PedroBMNG #behaviour #using
Using Text Replay Tagging to Produce Detectors of Systematic Experimentation Behavior Patterns (MSP, RSJdB, OM, AN, JDG), pp. 181–190.
ITiCSEITiCSE-2010-Kumar #fault #online #testing
The case for error detection support during online testing (ANK), p. 311.
CSMRCSMR-2010-KnieselBHFCGT #design pattern #tool support
DPDX--Towards a Common Result Exchange Format for Design Pattern Detection Tools (GK, AB, PH, LJF, AC, YGG, NT), pp. 232–235.
CSMRCSMR-2010-LuciaDGR #behaviour #design pattern #model checking
Improving Behavioral Design Pattern Detection through Model Checking (ADL, VD, CG, MR), pp. 176–185.
CSMRCSMR-2010-RoubtsovSB #composition #dependence #injection #java #smell
Detecting Modularity “Smells” in Dependencies Injected with Java Annotations (SAR, AS, MvdB), pp. 244–247.
ICPCICPC-2010-BarbourYZ #clone detection #scalability
A Technique for Just-in-Time Clone Detection in Large Scale Systems (LB, HY, YZ), pp. 76–79.
ICPCICPC-2010-BeyerF #dependence #low level #named
DepDigger: A Tool for Detecting Complex Low-Level Dependencies (DB, AF), pp. 40–41.
ICSMEICSM-2010-BernardiL #design pattern #modelling
Model-driven detection of Design Patterns (MLB, GADL), pp. 1–5.
ICSMEICSM-2010-CanforaCCP #empirical #logic #multi #using
Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
ICSMEICSM-2010-CorazzaMMS #approach #clone detection #kernel
A Tree Kernel based approach for clone detection (AC, SDM, VM, GS), pp. 1–5.
ICSMEICSM-2010-HummelJHC #clone detection #distributed #incremental #scalability
Index-based code clone detection: incremental, distributed, scalable (BH, EJ, LH, MC), pp. 1–9.
ICSMEICSM-2010-JalbertB #clone detection #concurrent #debugging #identification #using
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
ICSMEICSM-2010-LuciaDGR #design pattern #dynamic analysis #eclipse #plugin
An Eclipse plug-in for the detection of design pattern instances through static and dynamic analysis (ADL, VD, CG, MR), pp. 1–6.
PASTEPASTE-2010-Schmeelk #benchmark #metric #towards
Towards a unified fault-detection benchmark (SS), pp. 61–64.
SCAMSCAM-2010-BastenS #ambiguity #named
AMBIDEXTER: Practical Ambiguity Detection (BB, TvdS), pp. 101–102.
SCAMSCAM-2010-BrixtelFLBR #clone detection #independence
Language-Independent Clone Detection Applied to Plagiarism Detection (RB, MF, BL, CB, RR), pp. 77–86.
WCREWCRE-2010-BiegelD #clone detection #configuration management
Highly Configurable and Extensible Code Clone Detection (BB, SD), pp. 237–241.
WCREWCRE-2010-DavisG #assembly #source code
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler (IJD, MWG), pp. 242–246.
WCREWCRE-2010-SelimFZ #clone detection #representation #using
Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
WCREWCRE-2010-WongASLM #behaviour #programming #reverse engineering #search-based #using
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
ICALPICALP-v1-2010-AmirELPS
Cycle Detection and Correction (AA, EE, AL, EP, NS), pp. 43–54.
ICALPICALP-v1-2010-KroviMOR #quantum
Finding Is as Easy as Detecting for Quantum Walks (HK, FM, MO, JR), pp. 540–551.
SEFMSEFM-2010-CristiaAM #framework #testing
Pruning Testing Trees in the Test Template Framework by Detecting Mathematical Contradictions (MC, PA, PRM), pp. 268–277.
FLOPSFLOPS-2010-Sagonas #concurrent #erlang #fault #source code #static analysis #using
Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
LISPILC-2010-Mehnert #fault #type inference #type system
Extending Dylan’s type system for better type inference and error detection (HM), pp. 1–10.
AIIDEAIIDE-2010-Perkins #analysis #approach #composition #game studies #realtime
Terrain Analysis in Real-Time Strategy Games: An Integrated Approach to Choke Point Detection and Region Decomposition (LP).
CoGCIG-2010-BellFHKOQ
Ghost direction detection and other innovations for Ms. Pac-Man (NB, XF, RH, GK, EO, SQ), pp. 465–472.
CoGCIG-2010-ChapelBM #game studies #online #probability
Probabilistic approaches to cheating detection in online games (LC, DB, DM), pp. 195–201.
ICGTICGT-2010-TaentzerELW #graph #version control
Conflict Detection for Model Versioning Based on Graph Modifications (GT, CE, PL, MW), pp. 171–186.
CHICHI-2010-AppertB #gesture #recognition
Scale detection for a priori gesture recognition (CA, OB), pp. 879–882.
CHICHI-2010-NakatsumaS #2d #communication #network
High accuracy position and orientation detection in two-dimensional communication network (KN, HS), pp. 2297–2306.
CHICHI-2010-WuDM #enterprise #network #social #using
Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
CAiSECAiSE-2010-BouassidaB #approach #problem
A New Approach for Pattern Problem Detection (NB, HBA), pp. 150–164.
ICEISICEIS-AIDSS-2010-PortelaAROG #automation #framework #game studies #performance
An Intelligent Framework for Automatic Event Detection in Robotic Soccer Games — An Auxiliar Tool to Help Coaches Improve their Teams’ Performance (JP, PA, LPR, ECO, JG), pp. 244–249.
CIKMCIKM-2010-CiglanN #named #personalisation #statistics #wiki
WikiPop: personalized event detection system based on Wikipedia page view statistics (MC, KN), pp. 1931–1932.
CIKMCIKM-2010-DingSBVWLC #automation #embedded #feature model #framework #image #using
Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
CIKMCIKM-2010-FisichellaSDN #health
Unsupervised public health event detection for epidemic intelligence (MF, AS, KD, WN), pp. 1881–1884.
CIKMCIKM-2010-GeXZOYL #evolution #named
Top-Eye: top-k evolving trajectory outlier detection (YG, HX, ZHZ, HTO, JY, KCL), pp. 1733–1736.
CIKMCIKM-2010-HuangSHDSL #algorithm #clustering #community #named #network
SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks (JH, HS, JH, HD, YS, YL), pp. 219–228.
CIKMCIKM-2010-LimNJLL #behaviour #overview #rating #using
Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
CIKMCIKM-2010-MurataTMKM
Detecting periodic changes in search intentions in a search engine (MM, HT, YM, RK, TM), pp. 1525–1528.
CIKMCIKM-2010-Nomoto #similarity
Two-tier similarity model for story link detection (TN), pp. 789–798.
CIKMCIKM-2010-PopescuP #twitter
Detecting controversial events from twitter (AMP, MP), pp. 1873–1876.
CIKMCIKM-2010-SotoudehA #framework #induction #using
Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
CIKMCIKM-2010-TianWWRCM #mobile #topic
Topic detection and organization of mobile text messages (YT, WW, XW, JR, CC, JM), pp. 1877–1880.
CIKMCIKM-2010-WuIPR #approach #wiki
Elusive vandalism detection in wikipedia: a text stability-based approach (QW, DI, CP, LR), pp. 1797–1800.
ECIRECIR-2010-BoudinSN #information retrieval
Improving Medical Information Retrieval with PICO Element Detection (FB, LS, JYN), pp. 50–61.
ECIRECIR-2010-KimCLL #effectiveness #image #named #sequence #using
BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
ICMLICML-2010-FelzenszwalbGMR #modelling
Discriminative Latent Variable Models for Object Detection (PFF, RBG, DAM, DR), pp. 11–12.
ICMLICML-2010-ShoebG #machine learning
Application of Machine Learning To Epileptic Seizure Detection (AHS, JVG), pp. 975–982.
ICMLICML-2010-XuHFPJ #mining #problem #scalability
Detecting Large-Scale System Problems by Mining Console Logs (WX, LH, AF, DAP, MIJ), pp. 37–46.
ICPRICPR-2010-AnthimopoulosVG #evaluation #image
A Pixel-Based Evaluation Method for Text Detection in Color Images (MA, NV, BG), pp. 3264–3267.
ICPRICPR-2010-AranG #people
Fusing Audio-Visual Nonverbal Cues to Detect Dominant People in Group Conversations (OA, DGP), pp. 3687–3690.
ICPRICPR-2010-BanerjeeK #modelling
Model-Based Detection of Acoustically Dense Objects in Ultrasound (JB, KBK), pp. 4166–4169.
ICPRICPR-2010-BelaroussiFTSCP #case study #image
Road Sign Detection in Images: A Case Study (RB, PF, JPT, BS, PC, NP), pp. 484–488.
ICPRICPR-2010-BenedekDZ #image #process
Building Detection in a Single Remotely Sensed Image with a Point Process of Rectangles (CB, XD, JZ), pp. 1417–1420.
ICPRICPR-2010-BimboLMP #geometry #using
Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
ICPRICPR-2010-BouchrikaCNMT #people #using
Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
ICPRICPR-2010-BrezovanBGSS #adaptation #image #performance #visual notation
An Adaptive Method for Efficient Detection of Salient Visual Object from Color Images (MB, DDB, EG, LS, CSS), pp. 2346–2349.
ICPRICPR-2010-BushraOEO #linear
QRS Complex Detection by Non Linear Thresholding of Modulus Maxima (BJ, OB, EF, OL), pp. 4500–4503.
ICPRICPR-2010-CadavidA #automation #modelling #using #visual notation
Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
ICPRICPR-2010-CandamoGKG #using
Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
ICPRICPR-2010-ChaoTLC #fault
A Generalized Anisotropic Diffusion for Defect Detection in Low-Contrast Surfaces (SMC, DMT, WCL, WYC), pp. 4408–4411.
ICPRICPR-2010-CheongL #case study #clustering #topic #twitter
A Study on Detecting Patterns in Twitter Intra-topic User and Message Clustering (MC, VCSL), pp. 3125–3128.
ICPRICPR-2010-ConteFPTV #people
Counting Moving People in Videos by Salient Points Detection (DC, PF, GP, FT, MV), pp. 1743–1746.
ICPRICPR-2010-DasKK #multi #optimisation
Sub-Category Optimization for Multi-view Multi-pose Object Detection (DD, YK, YK), pp. 1405–1408.
ICPRICPR-2010-DengH #composition #exponential #process
Voice Activity Detection Based on Complex Exponential Atomic Decomposition and Likelihood Ratio Test (SD, JH), pp. 89–92.
ICPRICPR-2010-DengSS #network #pattern matching #pattern recognition #recognition
Applying Error-Correcting Output Coding to Enhance Convolutional Neural Network for Target Detection and Pattern Recognition (HD, GS, CYS), pp. 4291–4294.
ICPRICPR-2010-DornaikaC #classification #performance #using
Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
ICPRICPR-2010-DoshiB
Detecting Vorticity in Optical Flow of Fluids (AD, AGB), pp. 2118–2121.
ICPRICPR-2010-DurakN #classification #image
Principal Contour Extraction and Contour Classification to Detect Coronal Loops from the Solar Images (ND, ON), pp. 2403–2406.
ICPRICPR-2010-FaragGEF #data-driven #modelling #robust
Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT (AAF, JHG, SE, AAF), pp. 2588–2591.
ICPRICPR-2010-FengJR
Detecting Altered Fingerprints (JF, AKJ, AR), pp. 1622–1625.
ICPRICPR-2010-FengZH #learning #online #self
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes (JF, CZ, PH), pp. 3599–3602.
ICPRICPR-2010-FouheySB #image #multi #using
Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
ICPRICPR-2010-FujitaHSTS #image #using
An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPRICPR-2010-GaoHLZW #kernel
Local Outlier Detection Based on Kernel Regression (JG, WH, WL, Z(Z, OW), pp. 585–588.
ICPRICPR-2010-Garcia-TubioWS #geometry
Combining Geometry and Local Appearance for Object Detection (MPGT, HW, LS), pp. 4024–4027.
ICPRICPR-2010-GiannakopoulosPT #approach #multimodal #video
A Multimodal Approach to Violence Detection in Video Sharing Sites (TG, AP, ST), pp. 3244–3247.
ICPRICPR-2010-GuoM #using
Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
ICPRICPR-2010-GuptaD #communication #network #social
Detection and Characterization of Anomalous Entities in Social Communication Networks (NG, LD), pp. 738–741.
ICPRICPR-2010-HaberdarS #framework #mobile #platform #refinement #using #video
Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
ICPRICPR-2010-HamKN #automation #finite #fuzzy
Fire-Flame Detection Based on Fuzzy Finite Automation (SH, BK, JYN), pp. 3919–3922.
ICPRICPR-2010-HarirchiRMDG #algorithm #using
Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
ICPRICPR-2010-HayashiUPS #artificial reality #multi
An Augmented Reality Setup with an Omnidirectional Camera Based on Multiple Object Detection (TH, HU, JP, HS), pp. 3171–3174.
ICPRICPR-2010-HeimonenH #framework
A Human Detection Framework for Heavy Machinery (TAH, JH), pp. 416–419.
ICPRICPR-2010-HongCCG #set
Boosted Sigma Set for Pedestrian Detection (XH, HC, XC, WG), pp. 3017–3020.
ICPRICPR-2010-HuangDLTL #authentication #normalisation
Finger-Vein Authentication Based on Wide Line Detector and Pattern Normalization (BH, YD, RL, DT, WL), pp. 1269–1272.
ICPRICPR-2010-HuangM #automation #locality #video
Automatic Detection and Localization of Natural Scene Text in Video (XH, HM), pp. 3216–3219.
ICPRICPR-2010-IzadiS #automation #image #segmentation #using
Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
ICPRICPR-2010-JoshiP #adaptation #incremental #learning
Scene-Adaptive Human Detection with Incremental Active Learning (AJJ, FP), pp. 2760–2763.
ICPRICPR-2010-JulianDLCBC #automation
Automatic Hair Detection in the Wild (PJ, CD, FL, VC, AB, AC), pp. 4617–4620.
ICPRICPR-2010-KalalMM #automation #fault
Forward-Backward Error: Automatic Detection of Tracking Failures (ZK, KM, JM), pp. 2756–2759.
ICPRICPR-2010-KamarainenI #canonical #learning
Learning and Detection of Object Landmarks in Canonical Object Space (JKK, JI), pp. 1409–1412.
ICPRICPR-2010-KhosrowabadiQWA #bound #recognition #self #using
EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPRICPR-2010-KontschiederDKBB #image
Detecting Paper Fibre Cross Sections in Microtomy Images (PK, MD, JK, WB, HB), pp. 316–319.
ICPRICPR-2010-KonyaES #documentation #image #performance
Fast Seamless Skew and Orientation Detection in Document Images (IVK, SE, CS), pp. 1924–1928.
ICPRICPR-2010-KrajewskiBK #case study #classification #multi #self #speech
Comparing Multiple Classifiers for Speech-Based Detection of Self-Confidence — A Pilot Study (JK, AB, SK), pp. 3716–3719.
ICPRICPR-2010-KrishnanS #using
Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
ICPRICPR-2010-Landesa-VazquezA
The Role of Polarity in Haar-like Features for Face Detection (ILV, JLAC), pp. 412–415.
ICPRICPR-2010-LathenCKB #linear #robust
Non-ring Filters for Robust Detection of Linear Structures (GL, OC, HK, MB), pp. 233–236.
ICPRICPR-2010-LefakisWGS
Boosted Edge Orientation Histograms for Grasping Point Detection (LL, HW, MPGT, LS), pp. 4072–4076.
ICPRICPR-2010-Lian #performance #retrieval
Fast Fingerprint Retrieval with Line Detection (HCL), pp. 3151–3154.
ICPRICPR-2010-LiaoH #energy
Slip and Fall Events Detection by Analyzing the Integrated Spatiotemporal Energy Map (TL, CLH), pp. 1718–1721.
ICPRICPR-2010-LinW #framework #platform #using
Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
ICPRICPR-2010-LiPG #evaluation #realtime
Real-Time Traffic Sign Detection: An Evaluation Study (YL, SP, WG), pp. 3033–3036.
ICPRICPR-2010-LiSN #documentation #image #performance #recognition
Fast Logo Detection and Recognition in Document Images (ZL, MSA, MN), pp. 2716–2719.
ICPRICPR-2010-LiuLLLS #markov #modelling #process
Noise-Robust Voice Activity Detector Based on Hidden Semi-Markov Models (XL, YL, YL, HL, BS), pp. 81–84.
ICPRICPR-2010-LiuQW #automation
Automatic Detection of Phishing Target from Phishing Webpage (GL, BQ, LW), pp. 4153–4156.
ICPRICPR-2010-LiZZ #invariant #using
Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
ICPRICPR-2010-LuWD #random
Part Detection, Description and Selection Based on Hidden Conditional Random Fields (WL, SW, XD), pp. 657–660.
ICPRICPR-2010-MaHHL
Context Inspired Pedestrian Detection in Far-Field Videos (WM, PH, LH, CL), pp. 3009–3012.
ICPRICPR-2010-ManciniFZ #multi
Road Change Detection from Multi-Spectral Aerial Data (AM, EF, PZ), pp. 448–451.
ICPRICPR-2010-MarcialisRT #analysis
Analysis of Fingerprint Pores for Vitality Detection (GLM, FR, AT), pp. 1289–1292.
ICPRICPR-2010-MehmoodN #kernel #using
Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
ICPRICPR-2010-MilitzerHJTH #automation #image #segmentation
Automatic Detection and Segmentation of Focal Liver Lesions in Contrast Enhanced CT Images (AM, TH, FJ, CT, JH), pp. 2524–2527.
ICPRICPR-2010-MoroTU #using
Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
ICPRICPR-2010-NguyenFP #towards
Towards a Generic Feature-Selection Measure for Intrusion Detection (HTN, KF, SP), pp. 1529–1532.
ICPRICPR-2010-NishioOB
Hierarchical Anomality Detection Based on Situation (SN, HO, NB), pp. 1108–1111.
ICPRICPR-2010-OzcanG #fuzzy
Fuzzy Support Vector Machines for ECG Arrhythmia Detection (NOO, FSG), pp. 2973–2976.
ICPRICPR-2010-OzturkYA
Detecting Dominant Motion Flows in Unstructured/Structured Crowd Scenes (OO, TY, KA), pp. 3533–3536.
ICPRICPR-2010-PaivaT #image #using
Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
ICPRICPR-2010-PapalazarouRW #estimation #image #multi #using
Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
ICPRICPR-2010-PapariCP #novel #using
Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
ICPRICPR-2010-ParkKS #markov #modelling #recognition #using #visual notation
Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
ICPRICPR-2010-PoullotS #image #scalability #video
Detecting Screen Shot Images within Large-Scale Video Archive (SP, SS), pp. 3203–3207.
ICPRICPR-2010-PrisacariuTZRG #3d #towards
Integrating Object Detection with 3D Tracking Towards a Better Driver Assistance System (VAP, RT, KZ, IDR, LJVG), pp. 3344–3347.
ICPRICPR-2010-PutpuekCLS #approach #identification
Unified Approach to Detection and Identification of Commercial Films by Temporal Occurrence Pattern (NP, NC, CL, SS), pp. 3288–3291.
ICPRICPR-2010-QinVG #image
Background Filtering for Improving of Object Detection in Images (GQ, BV, LG), pp. 922–925.
ICPRICPR-2010-QiuFW #visual notation
Detect Visual Spoofing in Unicode-Based Text (BQ, NF, LW), pp. 1949–1952.
ICPRICPR-2010-ReckyL #using
Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
ICPRICPR-2010-RenHHLC
A Sample Pre-mapping Method Enhancing Boosting for Object Detection (HR, XH, CKH, LL, XC), pp. 3005–3008.
ICPRICPR-2010-RudinacJ #locality
Saliency Detection and Object Localization in Indoor Environments (MR, PPJ), pp. 404–407.
ICPRICPR-2010-ScandaliarisVS #analysis #comparative #image #video
Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
ICPRICPR-2010-SenechalBP #automation #using
Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
ICPRICPR-2010-Seo #distance #matrix
Speaker Change Detection Based on the Pairwise Distance Matrix (JSS), pp. 93–96.
ICPRICPR-2010-SeppkeDH #energy #image #symmetry #using
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
ICPRICPR-2010-SertelCLSG #analysis #approach #image
An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
ICPRICPR-2010-SeverskyY #3d #scalability #set
Scalable Cage-Driven Feature Detection and Shape Correspondence for 3D Point Sets (LMS, LY), pp. 3557–3560.
ICPRICPR-2010-ShamiliBA #distributed #machine learning #mobile #using
Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
ICPRICPR-2010-ShiGW #realtime
Real-Time Abnormal Event Detection in Complicated Scenes (YS, YG, RW), pp. 3653–3656.
ICPRICPR-2010-ShimosakaINSM #process
Detecting Human Activity Profiles with Dirichlet Enhanced Inhomogeneous Poisson Processes (MS, TI, HN, TS, TM), pp. 4384–4387.
ICPRICPR-2010-ShivakumaraPT #video
New Wavelet and Color Features for Text Detection in Video (PS, TQP, CLT), pp. 3996–3999.
ICPRICPR-2010-SirmacekU #network #using
Road Network Extraction Using Edge Detection and Spatial Voting (BS, ), pp. 3113–3116.
ICPRICPR-2010-SongLLJ #representation
A Discriminative Model for Object Representation and Detection via Sparse Features (XS, PL, LL, YJ), pp. 3077–3080.
ICPRICPR-2010-StephaniJRH #automation
Automatically Detecting Peaks in Terahertz Time-Domain Spectroscopy (HS, JJ, CR, BH), pp. 4468–4471.
ICPRICPR-2010-SuLLT
An RST-Tolerant Shape Descriptor for Object Detection (CWS, HYML, YML, HRT), pp. 766–769.
ICPRICPR-2010-SultaniC #using
Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
ICPRICPR-2010-SunB #3d
3D Filtering for Injury Detection in Brain MRI (YS, BB), pp. 2568–2571.
ICPRICPR-2010-SunHL #data-driven
Data-Driven Foreground Object Detection from a Non-stationary Camera (SWS, FH, HYML), pp. 3053–3056.
ICPRICPR-2010-SunVFT #automation
Automated Detection of Nucleoplasmic Bridges for DNA Damage Scoring in Binucleated Cells (CS, PV, MF, PT), pp. 2480–2483.
ICPRICPR-2010-SuZSH #2d #image
Detection of Shapes in 2D Point Clouds Generated from Images (JS, ZZ, AS, FH), pp. 2640–2643.
ICPRICPR-2010-TahirYBAMK #concept #visual notation
The University of Surrey Visual Concept Detection System at ImageCLEF@ICPR: Working Notes (MAT, FY, MB, MA, KM, JK), pp. 850–853.
ICPRICPR-2010-TasdemirC #video
Motion Vector Based Features for Content Based Video Copy Detection (KT, AEÇ), pp. 3134–3137.
ICPRICPR-2010-TaxHVP #clustering #concept #learning #multi #using
The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
ICPRICPR-2010-TopalAG #approach #heuristic #realtime #robust
Edge Drawing: A Heuristic Approach to Robust Real-Time Edge Detection (CT, CA, YG), pp. 2424–2427.
ICPRICPR-2010-TorrentPLFSMP #approach #using
Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
ICPRICPR-2010-TosatoFCM
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds (DT, MF, MC, VM), pp. 3308–3311.
ICPRICPR-2010-TsaiHTC #pipes and filters #predict #scalability #using
Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
ICPRICPR-2010-VerschaeR #multi
Coarse-To-Fine Multiclass Nested Cascades for Object Detection (RV, JRdS), pp. 344–347.
ICPRICPR-2010-VillamizarMAS #category theory #multi #performance #random
Shared Random Ferns for Efficient Detection of Multiple Categories (MV, FMN, JAC, AS), pp. 388–391.
ICPRICPR-2010-Wang #documentation #recognition #using
Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
ICPRICPR-2010-WangY
Detection Based Low Frame Rate Human Tracking (LW, NHCY), pp. 3529–3532.
ICPRICPR-2010-WhitelamJB #case study #multi
Multispectral Eye Detection: A Preliminary Study (CW, ZJ, TB), pp. 209–212.
ICPRICPR-2010-WijnhovenW #performance #probability #using
Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
ICPRICPR-2010-WuHCCT #interactive #using #visual notation
Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
ICPRICPR-2010-XingAL #learning #multi
Multiple Human Tracking Based on Multi-view Upper-Body Detection and Discriminative Learning (JX, HA, SL), pp. 1698–1701.
ICPRICPR-2010-YangQ #approach #distributed #effectiveness #parametricity
An Effective Decentralized Nonparametric Quickest Detection Approach (DY, HQ), pp. 2278–2281.
ICPRICPR-2010-YukselG #classification
Variational Mixture of Experts for Classification with Applications to Landmine Detection (SEY, PDG), pp. 2981–2984.
ICPRICPR-2010-ZengM #multi #people #robust
Robust Head-Shoulder Detection by PCA-Based Multilevel HOG-LBP Detector for People Counting (CZ, HM), pp. 2069–2072.
ICPRICPR-2010-ZhangGC #invariant #using
Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
ICPRICPR-2010-ZhangK10a #graph #using
Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
ICPRICPR-2010-ZhangST10a #lens
Contact Lens Detection Based on Weighted LBP (HZ, ZS, TT), pp. 4279–4282.
ICPRICPR-2010-ZhangXL #video
Extracting Key Sub-trajectory Features for Supervised Tactic Detection in Sports Video (YZ, CX, HL), pp. 125–128.
ICPRICPR-2010-ZhangXW #data transformation
Data Transformation of the Histogram Feature in Object Detection (RZ, BX, CW), pp. 2893–2896.
ICPRICPR-2010-ZhangZYK #classification #learning #representation #taxonomy
Microaneurysm (MA) Detection via Sparse Representation Classifier with MA and Non-MA Dictionary Learning (BZ, LZ, JY, FK), pp. 277–280.
ICPRICPR-2010-ZhouNW #approach #novel
A Novel Approach to Detect Ship-Radiated Signal Based on HMT (YZ, ZN, CW), pp. 4601–4604.
KDDKDD-2010-CaoOYW #behaviour #sequence
Detecting abnormal coupled sequences and sequence changes in group-based manipulative trading behaviors (LC, YO, PSY, GW), pp. 85–94.
KDDKDD-2010-ChenLB #approach #named #statistics
GLS-SOD: a generalized local statistical approach for spatial outlier detection (FC, CTL, APB), pp. 1069–1078.
KDDKDD-2010-DasMSO #algorithm #case study #kernel #learning #multi #safety
Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study (SD, BLM, ANS, NCO), pp. 47–56.
KDDKDD-2010-GaoLFWSH #community #network #on the #performance
On community outliers and their efficient detection in information networks (JG, FL, WF, CW, YS, JH), pp. 813–822.
KDIRKDIR-2010-BonninBB #modelling #parallel #predict #web
Detecting Parallel Browsing to Improve Web Predictive Modeling (GB, AB, AB), pp. 504–509.
KDIRKDIR-2010-LieglGSH #automation #sentiment #taxonomy
Dictionary Extension for Improving Automated Sentiment Detection (JL, SG, AS, AHH), pp. 404–407.
KDIRKDIR-2010-Onem #behaviour #classification #network
Unwanted Behaviour Detection and Classification in Network Traffic (IMÖ), pp. 122–128.
SEKESEKE-2010-ArrudaCD #framework #using
A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKESEKE-2010-ElamyFL #multi
A Multiagent System for Automate Detection and Diagnosis of Active Tuberculosis on Chest Radiograph and CT Thorax (AHE, BHF, RL), pp. 495–498.
SEKESEKE-2010-FuL #constraints #string #theorem proving #web
A String Constraint Solver for Detecting Web Application Vulnerability (XF, CCL), pp. 535–542.
SEKESEKE-2010-MoshirpourMF #behaviour #distributed #specification #using
Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
SEKESEKE-2010-ShinPS
Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
SIGIRSIGIR-2010-Barron-Cedeno #on the #reuse
On the mono- and cross-language detection of text reuse and plagiarism (ABC), p. 914.
SIGIRSIGIR-2010-ChenMCRH #rank #web
Web page publication time detection and its application for page rank (ZC, JM, CC, HR, SH), pp. 859–860.
SIGIRSIGIR-2010-GuoA #interactive #web
Ready to buy or just browsing?: detecting web searcher goals from interaction data (QG, EA), pp. 130–137.
SIGIRSIGIR-2010-HajishirziYK #adaptation #learning #similarity
Adaptive near-duplicate detection via similarity learning (HH, WtY, AK), pp. 419–426.
SIGIRSIGIR-2010-HeR #approach #automation #generative #ranking
A ranking approach to target detection for automatic link generation (JH, MdR), pp. 831–832.
SIGIRSIGIR-2010-LiuLGB #behaviour
Can search systems detect users’ task difficulty?: some behavioral signals (JL, CL, JG, NJB), pp. 845–846.
SIGIRSIGIR-2010-WangLC #bound #query
Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
SIGIRSIGIR-2010-ZhangZYH #performance #sequence
Efficient partial-duplicate detection based on sequence matching (QZ, YZ, HY, XH), pp. 675–682.
ECMFAECMFA-2010-Lopez-HerrejonE #consistency #modelling #multi #nondeterminism #variability
Detecting Inconsistencies in Multi-View Models with Variability (RELH, AE), pp. 217–232.
MODELSMoDELS-v2-2010-GerthKLE #precise #process #using
Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
MODELSMoDELS-v2-2010-SilvaBBG #modelling #process
Early Deviation Detection in Modeling Activities of MDE Processes (MAAdS, RB, XB, MPG), pp. 303–317.
ECOOPECOOP-2010-MonperrusBM #object-oriented
Detecting Missing Method Calls in Object-Oriented Software (MM, MB, MM), pp. 2–25.
OOPSLAOOPSLA-2010-GabelYYGS #consistency #nondeterminism #scalability #source code
Scalable and systematic detection of buggy inconsistencies in source code (MG, JY, YY, MG, ZS), pp. 175–190.
OOPSLAOOPSLA-2010-ShiPYLZCZ #concurrent #debugging #invariant
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs (YS, SP, ZY, SL, YZ, WC, WZ), pp. 160–174.
AdaEuropeAdaEurope-2010-Keul #version control
Static Versioning of Global State for Race Condition Detection (SK), pp. 111–124.
PADLPADL-2010-ChristakisS #erlang #static analysis
Static Detection of Race Conditions in Erlang (MC, KFS), pp. 119–133.
PADLPADL-2010-LiT #erlang #source code
Similar Code Detection and Elimination for Erlang Programs (HL, SJT), pp. 104–118.
PEPMPEPM-2010-BrownT #clone detection #haskell
Clone detection and elimination for Haskell (CB, SJT), pp. 111–120.
PEPMPEPM-2010-HofmannK #morphism #problem #towards #using
I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
PLDIPLDI-2010-BondBG #analysis #context-sensitive grammar #debugging #named #performance
Breadcrumbs: efficient context sensitivity for dynamic bug detection analyses (MDB, GZB, SZG), pp. 13–24.
PLDIPLDI-2010-BondCM #named
PACER: proportional detection of data races (MDB, KEC, KSM), pp. 255–268.
PLDIPLDI-2010-FlanaganF #memory management
Adversarial memory for detecting destructive races (CF, SNF), pp. 244–254.
PLDIPLDI-2010-LeeWHGM #debugging #interface #named
Jinn: synthesizing dynamic bug detectors for foreign language interfaces (BL, BW, MH, RG, KSM), pp. 36–49.
PLDIPLDI-2010-XuR
Detecting inefficiently-used containers to avoid bloat (G(X, AR), pp. 160–173.
REFSQREFSQ-2010-GleichCK #ambiguity #towards
Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources (BG, OC, LK), pp. 218–232.
ASEASE-2010-BiegelD #api #clone detection #flexibility #implementation #named
JCCD: a flexible and extensible API for implementing custom code clone detectors (BB, SD), pp. 167–168.
ASEASE-2010-LiHG #ajax #behaviour #interactive #web
Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors (WL, MJH, CG), pp. 155–158.
ASEASE-2010-PhamNNN
Detection of recurring software vulnerabilities (NHP, TTN, HAN, TNN), pp. 447–456.
ASEASE-2010-RederE #design #fault #named #uml #visualisation
Model/analyzer: a tool for detecting, visualizing and fixing design errors in UML (AR, AE), pp. 347–348.
ASEASE-2010-YangWRN #automation #coordination #natural language #requirements
Automatic detection of nocuous coordination ambiguities in natural language requirements (HY, AW, ANDR, BN), pp. 53–62.
FSEFSE-2010-EpifaniGT #black box
Change-point detection for black-box services (IE, CG, GT), pp. 227–236.
FSEFSE-2010-JoshiNSG #dynamic analysis #effectiveness
An effective dynamic analysis for detecting generalized deadlocks (PJ, MN, KS, DG), pp. 327–336.
FSEFSE-2010-LiCK #analysis #effectiveness
Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
ICSEICSE-2010-Brondum #architecture #concept
Software architecture for systems of software intensive systems (S3): the concepts and detection of inter-system relationships (JB), pp. 355–356.
ICSEICSE-2010-DeissenboeckHJ #clone detection
Code clone detection in practice (FD, BH, EJ), pp. 499–500.
ICSEICSE-2010-JurgensDFHSWDS #clone detection #quality #question #requirements #specification
Can clone detection support quality assessments of requirements specifications? (EJ, FD, MF, BH, BS, SW, CD, JS), pp. 79–88.
ICSEICSE-2010-LaiCC #parallel #random #source code #testing #thread
Detecting atomic-set serializability violations in multithreaded programs through active randomized testing (ZL, SCC, WKC), pp. 235–244.
ICSEICSE-2010-PhamNNWNN
Detecting recurring and similar software vulnerabilities (NHP, TTN, HAN, XW, ATN, TNN), pp. 227–230.
ICSEICSE-2010-SongWXZM #debugging #named
JDF: detecting duplicate bug reports in Jazz (YS, XW, TX, LZ, HM), pp. 315–316.
ICSEICSE-2010-TorlakC #effectiveness #interprocedural
Effective interprocedural resource leak detection (ET, SC), pp. 535–544.
SACSAC-2010-AnastasiadisSP #multi #performance
A fast multiplier-less edge detection accelerator for FPGAs (NA, IS, KZP), pp. 510–515.
SACSAC-2010-AnelliLHL #towards
Transport congestion events detection (TCED): towards decorrelating congestion detection from TCP (PA, EL, FH, DMLP), pp. 663–669.
SACSAC-2010-BraynerCS #approach #energy #network #quality #query #requirements
Dealing with application requirements and energy consumption in wireless sensor networks: a novelty detection approach for quality of query services (AB, ALVC, KMdS), pp. 786–790.
SACSAC-2010-ChengHR #video
Advanced motion detection for intelligent video surveillance systems (FCC, SCH, SJR), pp. 983–984.
SACSAC-2010-HuangT #semantics #specification
Semantic scene detection system for baseball videos based on the MPEG-7 specification (YFH, LHT), pp. 941–947.
SACSAC-2010-Kavallieratou #segmentation
Text line detection and segmentation: uneven skew angles and hill-and-dale writing (EK), pp. 59–60.
SACSAC-2010-LeeJL #graph #using
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-LesnerBBB #exclamation #framework #novel #source code #student
A novel framework to detect source code plagiarism: now, students have to work for real! (BL, RB, CB, GB), pp. 57–58.
SACSAC-2010-LinsBT #automation #documentation #image
Automatically detecting and classifying noises in document images (RDL, SB, MT), pp. 33–39.
SACSAC-2010-MaranzatoPLN #using
Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
SACSAC-2010-MigotinaRF #automation #fuzzy #parametricity #using
Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
SACSAC-2010-MissenBC #using
Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
SACSAC-2010-Mohy-ud-DinM #probability
Detecting narrow passages in configuration spaces via spectra of probabilistic roadmaps (HMuD, AM), pp. 1294–1298.
SACSAC-2010-OliveiraGGD #case study #experience
Experiences in reading detection with EEG signals (IO, OG, NG, CD), pp. 1236–1237.
SACSAC-2010-RieckSLHL #named
Botzilla: detecting the “phoning home” of malicious software (KR, GS, TL, TH, PL), pp. 1978–1984.
SACSAC-2010-RosswogG #clustering #mobile
Efficiently detecting clusters of mobile objects in the presence of dense noise (JR, KG), pp. 1095–1102.
SACSAC-2010-RoyPL #component #documentation #image #using
Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
SACSAC-2010-SamiYPHH #api #mining
Malware detection based on mining API calls (AS, BY, HR, NP, SH, AH), pp. 1020–1025.
SACSAC-2010-TeixeiraM #data type
Data stream anomaly detection through principal subspace tracking (PHdST, RLM), pp. 1609–1616.
SACSAC-2010-WelferSM #approach #image
A morphologic three-stage approach for detecting exudates in color eye fundus images (DW, JS, DRM), pp. 964–968.
LDTALDTA-J-2007-Schmitz #ambiguity
An experimental ambiguity detection tool (SS), pp. 71–84.
LDTALDTA-2010-BastenV #ambiguity #performance
Faster ambiguity detection by grammar filtering (BB, JJV), p. 5.
ASPLOSASPLOS-2010-ZhangSL #approach #concurrent #debugging #named
ConMem: detecting severe concurrency bugs through an effect-oriented approach (WZ, CS, SL), pp. 179–192.
CASECASE-2010-AllenT #consistency #fault #industrial #nondeterminism
Event-based fault detection of manufacturing cell: Data inconsistencies between academic assumptions and industry practice (LVA, DMT), pp. 426–432.
CASECASE-2010-BorsuYP #automation
Automated surface deformations detection and marking on automotive body panels (VB, AY, PP), pp. 551–556.
CASECASE-2010-DhupatiKRR #analysis #novel #speech #using #validation
A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASECASE-2010-LeungLECS
Detection and tracking of low contrast human sperm tail (CL, ZL, NE, RFC, YS), pp. 263–268.
CASECASE-2010-RichtsfeldSV #automation #realtime
Real-time edge detection for automated fibre-mat stitching (MR, AS, MV), pp. 557–562.
CASECASE-2010-RodriguezBMRW #analysis #assembly
Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
CASECASE-2010-RoutrayRS #clustering #fault #reduction
Data reduction and clustering techniques for fault detection and diagnosis in automotives (AR, AR, SS), pp. 326–331.
CGOCGO-2010-MarsVHS #execution #online
Contention aware execution: online contention detection and response (JM, NV, RH, MLS), pp. 257–265.
DACDAC-2010-CochranR #consistency #predict #runtime
Consistent runtime thermal prediction and control through workload phase detection (RC, SR), pp. 62–67.
DACDAC-2010-JindalAHLNW #logic
Detecting tangled logic structures in VLSI netlists (TJ, CJA, JH, ZL, GJN, CBW), pp. 603–608.
DACDAC-2010-KaoCTC #performance
An efficient phase detector connection structure for the skew synchronization system (YCK, HMC, KTT, SCC), pp. 729–734.
DATEDATE-2010-BorodinJ #fault
Instruction precomputation with memoization for fault detection (DB, BHHJ), pp. 1665–1668.
DATEDATE-2010-BoydSS #process #trade-off
Power-accuracy tradeoffs in human activity transition detection (JB, HS, AS), pp. 1524–1529.
DATEDATE-2010-CupaiuoloST #architecture #ml #throughput
Low-complexity high throughput VLSI architecture of soft-output ML MIMO detector (TC, MS, AT), pp. 1396–1401.
DATEDATE-2010-CutrupiCCG #flexibility
A flexible UWB Transmitter for breast cancer detection imaging systems (MC, MC, MRC, MG), pp. 1076–1081.
DATEDATE-2010-DadgourB #architecture #design #novel #pipes and filters #using
Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
DATEDATE-2010-DasMZC #hardware #information management #memory management
Detecting/preventing information leakage on the memory bus due to malicious hardware (AD, GM, JZ, ANC), pp. 861–866.
DATEDATE-2010-DiracoLS #recognition
An active vision system for fall detection and posture recognition in elderly healthcare (GD, AL, PS), pp. 1536–1541.
DATEDATE-2010-Moezzi-MadaniTD #flexibility #standard
A low-area flexible MIMO detector for WiFi/WiMAX standards (NMM, TT, WRD), pp. 1633–1636.
DATEDATE-2010-Scholzel #fault #performance
HW/SW co-detection of transient and permanent faults with fast recovery in statically scheduled data paths (MS), pp. 723–728.
OSDIOSDI-2010-EricksonMBO #concurrent #effectiveness #kernel
Effective Data-Race Detection for the Kernel (JE, MM, SB, KO), pp. 151–162.
PDPPDP-2010-BrugnoliHS #collaboration #grid #random #scheduling
Grid Scheduling Based on Collaborative Random Early Detection Strategies (MB, EH, MAS), pp. 35–42.
PDPPDP-2010-KomashinskiyK #data mining #mining
Malware Detection by Data Mining Techniques Based on Positionally Dependent Features (DK, IVK), pp. 617–623.
FASEFASE-2010-DistefanoF #java #memory management
Memory Leaks Detection in Java by Bi-abductive Inference (DD, IF), pp. 278–292.
STOCSTOC-2010-BhaskaraCCFV #approximate
Detecting high log-densities: an O(n1/4) approximation for densest k-subgraph (AB, MC, EC, UF, AV), pp. 201–210.
TACASTACAS-2010-ParizekK #component #fault #java #performance #random #using
Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
CAVCAV-2010-KahlonW #concurrent #debugging #graph #precise #source code
Universal Causality Graphs: A Precise Happens-Before Model for Detecting Bugs in Concurrent Programs (VK, CW), pp. 434–449.
CAVCAV-2010-KaiserKW #concurrent #source code
Dynamic Cutoff Detection in Parameterized Concurrent Programs (AK, DK, TW), pp. 645–659.
ICLPICLP-J-2010-OetschPST #source code
The system Kato: Detecting cases of plagiarism for answer-set programs (JO, JP, MS, HT), pp. 759–775.
ICSTICST-2010-BelliLBS #fault #sequence #testing
Fault Detection Likelihood of Test Sequence Length (FB, ML, CJB, HAS), pp. 402–411.
ICSTICST-2010-SantelicesHO #evolution #interactive #runtime
Precisely Detecting Runtime Change Interactions for Evolving Software (RAS, MJH, AO), pp. 429–438.
ISSTAISSTA-2010-GruskaWZ #learning #lightweight
Learning from 6, 000 projects: lightweight cross-project anomaly detection (NG, AW, AZ), pp. 119–130.
ISSTAISSTA-2010-KwonS #automation #component
Automatic detection of unsafe component loadings (TK, ZS), pp. 107–118.
WICSA-ECSAWICSA-ECSA-2009-FigueiredoGKGSPMSBRBAZM #architecture #case study
Detecting architecture instabilities with concern traces: An exploratory study (EF, IG, SSK, AG, CS, AP, ALM, LFdS, TVB, RAR, PvdB, MA, SZ, AMDM), pp. 261–264.
DocEngDocEng-2009-Popat
A panlingual anomalous text detector (ACP), pp. 201–204.
DRRDRR-2009-BeusekomSB #documentation #image #independence
Resolution Independent Skew and Orientation Detection for document images (JvB, FS, TMB), pp. 1–10.
DRRDRR-2009-FaureV
Simultaneous detection of vertical and horizontal text lines based on perceptual organisation (CF, NV), pp. 1–10.
DRRDRR-2009-SmithNL
Mark Detection from Scanned Ballots (EHBS, GN, DPL), pp. 1–10.
ICDARICDAR-2009-BodicLAHLK #graph #integer #linear #programming #using
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
ICDARICDAR-2009-BoubakerKA #algorithm
New Algorithm of Straight or Curved Baseline Detection for Short Arabic Handwritten Writing (HB, MK, AMA), pp. 778–782.
ICDARICDAR-2009-FujiyoshiSU
Syntactic Detection and Correction of Misrecognitions in Mathematical OCR (AF, MS, SU), pp. 1360–1364.
ICDARICDAR-2009-HanifP #algorithm #image #locality #using
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
ICDARICDAR-2009-LiuBMG #bound #fault #sequence
Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines (YL, KB, PM, CLG), pp. 1006–1010.
ICDARICDAR-2009-Martin-ToralAP #corpus #documentation
Detection of Incoherences in a Document Corpus Based on the Application of a Neuro-Fuzzy System (SMT, VA, GISP), pp. 1101–1105.
ICDARICDAR-2009-PhanST #video
A Laplacian Method for Video Text Detection (TQP, PS, CLT), pp. 66–70.
ICDARICDAR-2009-RoyPL #approach #documentation #recognition
Seal Detection and Recognition: An Approach for Document Indexing (PPR, UP, JL), pp. 101–105.
ICDARICDAR-2009-ShivakumaraPT #difference #video
A Gradient Difference Based Technique for Video Text Detection (PS, TQP, CLT), pp. 156–160.
ICDARICDAR-2009-ShivakumaraPT09a #robust #video
A Robust Wavelet Transform Based Technique for Video Text Detection (PS, TQP, CLT), pp. 1285–1289.
ICDARICDAR-2009-Smith #analysis #hybrid #layout
Hybrid Page Layout Analysis via Tab-Stop Detection (RWS), pp. 241–245.
ICDARICDAR-2009-SunK #embedded
Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds (WS, KK), pp. 341–345.
ICDARICDAR-2009-SunNFTH #image #string
Trinary Image Mosaicing Based Watermark String Detection (JS, SN, YF, HT, YH), pp. 306–310.
ICDARICDAR-2009-WangC #bound #documentation #image
Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles (HW, YC), pp. 1335–1339.
SIGMODSIGMOD-2009-FrankeG #named #network
ORDEN: outlier region detection and exploration in sensor networks (CF, MG), pp. 1075–1078.
SIGMODSIGMOD-2009-JiangYCC #ad hoc #named #query
AIDE: ad-hoc intents detection engine over query logs (YJ, HTY, KCCC, YSC), pp. 1091–1094.
SIGMODSIGMOD-2009-MeiM #adaptation #cost analysis #named #query
ZStream: a cost-based query processor for adaptively detecting composite events (YM, SM), pp. 193–206.
SIGMODSIGMOD-2009-SunLDC #analysis #workflow
Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
VLDBVLDB-2009-BeskalesSIB #modelling #query
Modeling and Querying Possible Repairs in Duplicate Detection (GB, MAS, IFI, SBD), pp. 598–609.
VLDBVLDB-2009-ChandramouliGM #on the fly #query
On-the-fly Progress Detection in Iterative Stream Queries (BC, JG, DM), pp. 241–252.
VLDBVLDB-2009-DongBS09a
Truth Discovery and Copying Detection in a Dynamic World (XLD, LBE, DS), pp. 562–573.
VLDBVLDB-2009-HassanzadehCML #algorithm #clustering #framework
Framework for Evaluating Clustering Algorithms in Duplicate Detection (OH, FC, RJM, HCL), pp. 1282–1293.
VLDBVLDB-2009-SunLNDC #analysis #named #workflow
WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
EDMEDM-2009-AgapitoO #performance #using
Detecting Symptoms of Low Performance Using Production Rules (JBA, AO), pp. 31–40.
EDMEDM-2009-PrataBCRC #collaboration #comprehension #learning
Detecting and Understanding the Impact of Cognitive and Interpersonal Conflict in Computer Supported Collaborative Learning Environments (DP, RSJdB, EC, CPR, YC), pp. 131–140.
EDMEDM-2009-RusLA #automation #information management #modelling #student
Automatic Detection of Student Mental Models During Prior Knowledge Activation in MetaTutor (VR, MCL, RA), pp. 161–170.
ICPCICPC-J-2008-RoyCK09 #approach #clone detection #comparison #evaluation #tool support
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
CSMRCSMR-2009-GodeK #clone detection #incremental
Incremental Clone Detection (NG, RK), pp. 219–228.
ICPCICPC-2009-ChilowiczDR #similarity #source code #syntax
Syntax tree fingerprinting for source code similarity detection (MC, ÉD, GR), pp. 243–247.
ICPCICPC-2009-KarumuriR #automation
Automatic detection of internal queues and stages in message processing systems (SK, SPR), pp. 315–316.
ICPCICPC-2009-KnieselB #approach #data fusion #design pattern
Standing on the shoulders of giants — A data fusion approach to design pattern detection (GK, AB), pp. 208–217.
ICSMEICSM-2009-FengG
Detecting virus mutations via dynamic matching (MF, RG), pp. 105–114.
ICSMEICSM-2009-NguyenNAPN #clone detection #evolution #incremental #scalability
Scalable and incremental clone detection for evolving software (TTN, HAN, JMAK, NHP, TNN), pp. 491–494.
ICSMEICSM-2009-Roy #analysis
Detection and analysis of near-miss software clones (CKR), pp. 447–450.
SCAMSCAM-2009-TiarksKF #assessment #state of the art #tool support
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools (RT, RK, RF), pp. 67–76.
WCREWCRE-1999-HigoK99a #clone detection #dependence #graph #quality
Enhancing Quality of Code Clone Detection with Program Dependency Graph (YH, SK), pp. 315–316.
WCREWCRE-1999-KawaguchiYUFKNI99a #automation #clone detection #ide #named
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE (SK, TY, HU, KF, YK, MN, HI), pp. 313–314.
WCREWCRE-1999-KrishnamoorthyDF99a #fault #static analysis
Static Detection of Disassembly Errors (NK, SKD, KF), pp. 259–268.
FMFM-2009-LangM #composition #confluence #partial order #reduction #using
Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
FDGFDG-2009-CiancariniF #game studies
Plagiarism detection in game-playing software (PC, GPF), pp. 264–271.
HCIHCI-AUII-2009-GlasnappB
A Human-Centered Model for Detecting Technology Engagement (JG, OB), pp. 621–630.
HCIHCI-AUII-2009-SunQPW #case study
A Study of Fire Information Detection on PDA Device (XS, WQ, TP, LW), pp. 105–113.
HCIHCI-NT-2009-Rebolledo-MendezDMVFLG #assessment #usability
Assessing NeuroSky’s Usability to Detect Attention Levels in an Assessment Exercise (GRM, ID, EMM, MDVC, SdF, FL, ARGG), pp. 149–158.
HCIHCI-NT-2009-TogawaKY #communication #mining #peer-to-peer #visualisation
Peer-to-Peer File Sharing Communication Detection System with Traffic Mining and Visualization (ST, KK, YY), pp. 900–909.
HCIHCI-VAD-2009-ChenGSEJ #learning
Computer-Based Learning to Improve Breast Cancer Detection Skills (YC, AGG, HJS, AE, JJ), pp. 49–57.
HCIHIMI-DIE-2009-LeeLKC #enterprise #fault #information management #process #statistics #using
Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
HCIHIMI-DIE-2009-ShinPC #bound
Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs (IS, NDP, HC), pp. 619–627.
VISSOFTVISSOFT-2009-Reiss #java #memory management #problem #visualisation
Visualizing the Java heap to detect memory problems (SPR), pp. 73–80.
CAiSECAiSE-2009-BlancMMM #consistency #incremental #nondeterminism
Incremental Detection of Model Inconsistencies Based on Model Operations (XB, AM, IM, TM), pp. 32–46.
ICEISICEIS-AIDSS-2009-AlbusacCLVL #analysis
Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
ICEISICEIS-AIDSS-2009-BiscarriMLGBM #framework #mining
A Mining Framework to Detect Non-technical Losses in Power Utilities (FB, IM, CL, JIG, JB, RM), pp. 96–101.
ICEISICEIS-AIDSS-2009-ElzingaPVD #concept analysis
Detecting Domestic Violence — Showcasing a Knowledge Browser based on Formal Concept Analysis and Emergent Self Organizing Maps (PE, JP, SV, GD), pp. 11–18.
ICEISICEIS-ISAS-2009-HidalgoGT #consistency #data type #nondeterminism #performance
Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates (SPH, RMG, FTdlR), pp. 176–181.
ICEISICEIS-ISAS-2009-SarmientoBC #approach #interactive #requirements
Applying an Event-based Approach for Detecting Requirements Interaction (ES, MRSB, MLMC), pp. 225–230.
ICEISICEIS-J-2009-IorioSVM #approach #documentation #multi
A Natural and Multi-layered Approach to Detect Changes in Tree-Based Textual Documents (ADI, MS, FV, CM), pp. 90–101.
ICEISICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #hybrid #network #using
An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
CIKMCIKM-2009-ChenR #analysis
Event detection from flickr data through wavelet-based spatial analysis (LC, AR), pp. 523–532.
CIKMCIKM-2009-ChenTJ #classification #framework #social #social media #web
A co-classification framework for detecting web spam and spammers in social media web sites (FC, PNT, AKJ), pp. 1807–1810.
CIKMCIKM-2009-GardnerX #approach #automation #sequence
Automatic link detection: a sequence labeling approach (JJG, LX), pp. 1701–1704.
CIKMCIKM-2009-GunnemannMFS #concept #orthogonal
Detection of orthogonal concepts in subspaces of high dimensional data (SG, EM, IF, TS), pp. 1317–1326.
CIKMCIKM-2009-HeCPQMG #evolution #how #question #topic
Detecting topic evolution in scientific literature: how can citations help? (QH, BC, JP, BQ, PM, CLG), pp. 957–966.
CIKMCIKM-2009-ViyanonM #database #relational #similarity #using #xml
A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
CIKMCIKM-2009-ZhangJZZ #bidirectional
Exploiting bidirectional links: making spamming detection easier (YZ, QJ, LZ, YZ), pp. 1839–1842.
ECIRECIR-2009-Barron-CedenoR #automation #comparison #n-gram #on the
On Automatic Plagiarism Detection Based on n-Grams Comparison (ABC, PR), pp. 696–700.
ECIRECIR-2009-BolelliEG #topic #using
Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation (LB, SE, CLG), pp. 776–780.
ECIRECIR-2009-MissenB #semantics #using
Using WordNet’s Semantic Relations for Opinion Detection in Blogs (MMSM, MB), pp. 729–733.
ICMLICML-2009-HaiderS #clustering #email
Bayesian clustering for email campaign detection (PH, TS), pp. 385–392.
ICMLICML-2009-PetersJGS
Detecting the direction of causal time series (JP, DJ, AG, BS), pp. 801–808.
KDDKDD-2009-AndoS #clustering
Detection of unique temporal segments by information theoretic meta-clustering (SA, ES), pp. 59–68.
KDDKDD-2009-BohmHMP #named
CoCo: coding cost for parameter-free outlier detection (CB, KH, NSM, CP), pp. 149–158.
KDDKDD-2009-DundarHBRR #case study #dataset #learning #using
Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology (MD, EDH, AKB, JPR, BR), pp. 279–288.
KDDKDD-2009-HiroseYNF #equation #network
Network anomaly detection based on Eigen equation compression (SH, KY, TN, RF), pp. 1185–1194.
KDDKDD-2009-LoCHKS #approach #behaviour #classification #mining
Classification of software behaviors for failure detection: a discriminative pattern mining approach (DL, HC, JH, SCK, CS), pp. 557–566.
KDDKDD-2009-MaSSV #learning #web
Beyond blacklists: learning to detect malicious web sites from suspicious URLs (JM, LKS, SS, GMV), pp. 1245–1254.
KDDKDD-2009-McGlohonBASF #graph #named
SNARE: a link analytic system for graph labeling and risk detection (MM, SB, MGA, DMS, CF), pp. 1265–1274.
KDDKDD-2009-VatturiW #using
Category detection using hierarchical mean shift (PV, WKW), pp. 847–856.
KDDKDD-2009-WuSJRG #framework #performance
A LRT framework for fast spatial anomaly detection (MW, XS, CJ, SR, JG), pp. 887–896.
KDDKDD-2009-YangJCZ #approach #community
Combining link and content for community detection: a discriminative approach (TY, RJ, YC, SZ), pp. 927–936.
KDDKDD-2009-YeLJHW
Intelligent file scoring system for malware detection from the gray list (YY, TL, QJ, ZH, LW), pp. 1385–1394.
KDDKDD-2009-ZhangWWZ #community #network #parallel #scalability
Parallel community detection on large networks with propinquity dynamics (YZ, JW, YW, LZ), pp. 997–1006.
KDIRKDIR-2009-Biryukov #database #topic
Topic Detection in Bibliographic Databases (MB), pp. 236–242.
MLDMMLDM-2009-CeciALCFVM #data type #mining #relational
Relational Frequent Patterns Mining for Novelty Detection from Data Streams (MC, AA, CL, CC, FF, CV, DM), pp. 427–439.
MLDMMLDM-2009-IsakssonD #algorithm #case study #comparative
A Comparative Study of Outlier Detection Algorithms (CI, MHD), pp. 440–453.
MLDMMLDM-2009-LiHLG #concept #random #streaming
Concept Drifting Detection on Noisy Streaming Data in Random Ensemble Decision Trees (PPL, XH, QL, YG), pp. 236–250.
MLDMMLDM-2009-Mejia-LavalleV
Outlier Detection with Explanation Facility (MML, ASV), pp. 454–464.
MLDMMLDM-2009-NunesSP #image #using
Detection of Masses in Mammographic Images Using Simpson’s Diversity Index in Circular Regions and SVM (APN, ACS, ACdP), pp. 540–553.
MLDMMLDM-2009-XiongBS
A Wavelet-Based Method for Detecting Seismic Anomalies in Remote Sensing Satellite Data (PX, YB, XS), pp. 569–581.
RecSysRecSys-2009-HurleyCZ #statistics
Statistical attack detection (NH, ZC, MZ), pp. 149–156.
SEKESEKE-2009-AxelssonBFSK #code review #fault #interactive #machine learning #overview #visualisation
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning (SA, DB, RF, DS, DK), pp. 412–417.
SEKESEKE-2009-BrownBD #named #open source
FiGD: An Open Source Intellectual Property Violation Detector (CDB, DB, DD), pp. 536–541.
SIGIRSIGIR-2009-BenevenutoRAAG #network #online #social #video
Detecting spammers and content promoters in online video social networks (FB, TR, VAFA, JMA, MAG), pp. 620–627.
SIGIRSIGIR-2009-CanCGJKRRSSUW #web
Web derived pronunciations for spoken term detection (DC, EC, AG, MJ, SK, BR, MR, MS, AS, MU, CMW), pp. 83–90.
SIGIRSIGIR-2009-ItakuraC #markov #using #wiki
Using dynamic markov compression to detect vandalism in the wikipedia (KYI, CLAC), pp. 822–823.
SIGIRSIGIR-2009-Schanda
Novelty detection across different source types and languages (JS), p. 854.
SIGIRSIGIR-2009-WongLC #adaptation #information management #mining
Mining employment market via text block detection and adaptive cross-domain information extraction (TLW, WL, BC), pp. 283–290.
ECMFAECMDA-FA-2009-GarcesJCB #adaptation #metamodelling #precise
Managing Model Adaptation by Precise Detection of Metamodel Changes (KG, FJ, PC, JB), pp. 34–49.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
PEPMPEPM-2009-CifuentesKLS #debugging #program analysis #using
Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
PEPMPEPM-2009-LiT #clone detection #erlang #refactoring
Clone detection and removal for Erlang/OTP within a refactoring environment (HL, SJT), pp. 169–178.
PLDIPLDI-2009-FlanaganF #concurrent #named #performance #precise
FastTrack: efficient and precise dynamic race detection (CF, SNF), pp. 121–133.
PLDIPLDI-2009-JoshiPSN #program analysis #random
A randomized dynamic program analysis technique for detecting real deadlocks (PJ, CSP, KS, MN), pp. 110–120.
PLDIPLDI-2009-MarinoMN #concurrent #effectiveness #lightweight #named
LiteRace: effective sampling for lightweight data-race detection (DM, MM, SN), pp. 134–143.
PLDIPLDI-2009-TournavitisWFO #approach #parallel #towards
Towards a holistic approach to auto-parallelization: integrating profile-driven parallelism detection and machine-learning based mapping (GT, ZW, BF, MFPO), pp. 177–187.
SASSAS-2009-SeidlV #analysis #concurrent
Region Analysis for Race Detection (HS, VV), pp. 171–187.
RERE-2009-MussbacherWA #aspect-oriented #interactive #semantics
Semantic-Based Interaction Detection in Aspect-Oriented Scenarios (GM, JW, DA), pp. 203–212.
REFSQREFSQ-2009-PerrouinBBT #consistency #modelling #nondeterminism #perspective #requirements
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective (GP, EB, BB, YLT), pp. 89–103.
ASEASE-2009-BurnimJSS #infinity #lightweight #named #runtime
Looper: Lightweight Detection of Infinite Loops at Runtime (JB, NJ, CS, KS), pp. 161–169.
ASEASE-2009-KawrykowR #api #automation
Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
ASEASE-2009-KimYS #concurrent #heuristic #memory management #model checking #precise #using
Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
ASEASE-2009-SardinhaCWGR #aspect-oriented #automation #named #requirements
EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements (AS, RC, NW, PG, AR), pp. 530–534.
ASEASE-2009-ThummalapentaX #mining #named
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions (ST, TX), pp. 283–294.
ASEASE-2009-WegrzynowiczS #design pattern #testing #towards
Towards a Comprehensive Test Suite for Detectors of Design Patterns (PW, KS), pp. 103–110.
ESEC-FSEESEC-FSE-2009-FigueiredoWG #named
ConcernMorph: metrics-based detection of crosscutting patterns (EF, JW, AFG), pp. 299–300.
ESEC-FSEESEC-FSE-2009-KahlonSKZ #concurrent #source code
Static data race detection for concurrent programs with asynchronous calls (VK, NS, EK, YZ), pp. 13–22.
ICSEICSE-2009-JurgensDH #clone detection #named #research
CloneDetective — A workbench for clone detection research (EJ, FD, BH), pp. 603–606.
ICSEICSE-2009-NaikPSG #concurrent #effectiveness
Effective static deadlock detection (MN, CSP, KS, DG), pp. 386–396.
ICSEICSE-2009-PhamNNAN #clone detection #graph #modelling
Complete and accurate clone detection in graph-based models (NHP, HAN, TTN, JMAK, TNN), pp. 276–286.
SACSAC-2009-BrooksI #classification #novel #visual notation
Visual detection of novel terrain via two-class classification (CAB, KI), pp. 1145–1150.
SACSAC-2009-ChavezSL #approach #uml
An approach to detection of UML-based ownership violation (HMC, WS, SL), pp. 541–542.
SACSAC-2009-KarnstedtKPSF #adaptation
Adaptive burst detection in a stream engine (MK, DK, CP, KUS, CF), pp. 1511–1515.
SACSAC-2009-LeS #concept #performance #visual notation
Efficient concept detection by fusing simple visual features (DDL, SS), pp. 1839–1840.
SACSAC-2009-LuYLELW #correlation #data type #incremental #using
Incremental outlier detection in data streams using local correlation integral (XL, TY, ZL, ME, WL, HW), pp. 1520–1521.
SACSAC-2009-MaoLPCH #approach #learning #multi
Semi-supervised co-training and active learning based approach for multi-view intrusion detection (CHM, HML, DP, TC, SYH), pp. 2042–2048.
SACSAC-2009-MarascuM #data type
Parameterless outlier detection in data streams (AM, FM), pp. 1491–1495.
SACSAC-2009-ParkYAMP #algorithm #approach #novel #search-based #segmentation #using
A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
SACSAC-2009-PlattMG #classification #topic
Improving classification based off-topic search detection via category relationships (AP, SSRM, NG), pp. 869–874.
SACSAC-2009-RyuKC #algorithm #documentation #evolution #using
A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model (CKR, HJK, HGC), pp. 863–868.
SACSAC-2009-Villamarin-SalomonB #similarity
Bayesian bot detection based on DNS traffic similarity (RVS, JCB), pp. 2035–2041.
SACSAC-2009-WanMKJ #communication #email #network
Link-based event detection in email communication networks (XW, EEM, NK, JJ), pp. 1506–1510.
LDTALDTA-2008-Basten09 #ambiguity #context-free grammar #usability
The Usability of Ambiguity Detection Methods for Context-Free Grammars (BB), pp. 35–46.
CASECASE-2009-MakkapatiN
Clump splitting based on detection of dominant points from contours (VM, SKN), pp. 197–201.
CASECASE-2009-SenguptaDBMD #fault #modelling #using
Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
CGOCGO-2009-DuanFWZY #c #c++ #concurrent #consistency #source code
Detecting and Eliminating Potential Violations of Sequential Consistency for Concurrent C/C++ Programs (YD, XF, LW, CZ, PCY), pp. 25–34.
DACDAC-2009-PotkonjakNNM #hardware #using
Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
DACDAC-2009-WenCCS #architecture #concurrent #debugging #manycore #named
NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core (CNW, SHC, TFC, APS), pp. 148–153.
DATEDATE-2009-AlvesNDB #fault #multi #using
Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
DATEDATE-2009-BarontiLRS #distributed #metric
Distributed sensor for steering wheel rip force measurement in driver fatigue detection (FB, FL, RR, RS), pp. 894–897.
DATEDATE-2009-BhagawatDC #architecture
Systolic like soft-detection architecture for 4×4 64-QAM MIMO system (PB, RD, GC), pp. 870–873.
DATEDATE-2009-DSilvaK #fixpoint #multi
Fixed points for multi-cycle path detection (VD, DK), pp. 1710–1715.
DATEDATE-2009-GarridoVSML #implementation
Implementation of a reduced-lattice MIMO detector for OFDM Systems (JSG, HV, MS, DM, AL), pp. 1626–1631.
DATEDATE-2009-GhoseGDAW #architecture #memory management
Architectural support for low overhead detection of memory violations (SG, LG, PD, AA, CW), pp. 652–657.
DATEDATE-2009-LiFNBPC #architecture #co-evolution #design #ml #parallel #set
Algorithm-architecture co-design of soft-output ML MIMO detector for parallel application specific instruction set processors (ML, RF, DN, BB, LVdP, FC), pp. 1608–1613.
DATEDATE-2009-YanHL #fault #online
A unified online Fault Detection scheme via checking of Stability Violation (GY, YH, XL), pp. 496–501.
DATEDATE-2009-YilmazC #fault
Seed selection in LFSR-reseeding-based test compression for the detection of small-delay defects (MY, KC), pp. 1488–1493.
PDPPDP-2009-HatahetCB #network
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment (SH, YC, AB), pp. 293–300.
PDPPDP-2009-KalewskiKK #distributed #performance #scalability
FAST Failure Detection Service for Large Scale Distributed Systems (MK, AK, JK), pp. 229–236.
PDPPDP-2009-Kotenko #framework #network
Framework for Integrated Proactive Network Worm Detection and Response (IVK), pp. 379–386.
PPoPPPPoPP-2009-RatanaworabhanBKZNP #symmetry
Detecting and tolerating asymmetric races (PR, MB, DK, BGZ, RN, KP), pp. 173–184.
SOSPSOSP-2009-XuHFPJ #mining #problem #scalability
Detecting large-scale system problems by mining console logs (WX, LH, AF, DAP, MIJ), pp. 117–132.
FASEFASE-2009-ChenWYS #named #static analysis
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis (QC, LW, ZY, SDS), pp. 425–439.
FASEFASE-2009-NguyenNPAN #clone detection #feature model #performance
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection (HAN, TTN, NHP, JMAK, TNN), pp. 440–455.
STOCSTOC-2009-AharonovALV #quantum
The detectability lemma and quantum gap amplification (DA, IA, ZL, UVV), pp. 417–426.
TACASTACAS-2009-SchollDPK #constraints #linear
Computing Optimized Representations for Non-convex Polyhedra by Detection and Removal of Redundant Linear Constraints (CS, SD, FP, SK), pp. 383–397.
CAVCAV-2009-BensalemBNS #composition #concurrent #named #verification
D-Finder: A Tool for Compositional Deadlock Detection and Verification (SB, MB, THN, JS), pp. 614–619.
CAVCAV-2009-LahiriQR #concurrent #fault #precise #smt #using
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
ICLPICLP-2009-Rosa #distributed #programming
Locally Distributed Predicates: A Programming Facility for Distributed State Detection (MD), pp. 557–558.
ICSTICST-2009-KaminskiA #fault #logic #testing #using
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection (GKK, PA), pp. 356–365.
ICSTICST-2009-WedyanAB #automation #effectiveness #fault #predict #refactoring #static analysis #tool support
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction (FW, DA, JMB), pp. 141–150.
ISSTAISSTA-2009-BabenkoMP #automation #named
AVA: automated interpretation of dynamically detected anomalies (AB, LM, FP), pp. 237–248.
ISSTAISSTA-2009-SaebjornsenWPQS #bytecode
Detecting code clones in binary executables (AS, JW, TP, DJQ, ZS), pp. 117–128.
DRRDRR-2008-GaoTQ #approach
A mixed approach to auto-detection of page body (LG, ZT, RQ), p. 68150.
VLDBVLDB-2008-AkdereCT #distributed
Plan-based complex event detection across distributed sources (MA, , NT), pp. 66–77.
VLDBVLDB-2008-KriegelKZ #clustering #correlation
Detecting clusters in moderate-to-high dimensional data: subspace clustering, pattern-based clustering, and correlation clustering (HPK, PK, AZ), pp. 1528–1529.
VLDBVLDB-2008-MetwallyEAA #correlation #named #using
SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
VLDBVLDB-2008-WeisNJLS
Industry-scale duplicate detection (MW, FN, UJ, JL, HS), pp. 1253–1264.
ITiCSEITiCSE-2008-JiWC #contest #experience #programming #source code
An experience of detecting plagiarized source codes in competitive programming contests (JHJ, GW, HGC), p. 369.
CSMRCSMR-2008-DhambriSP #design #visual notation
Visual Detection of Design Anomalies (KD, HAS, PP), pp. 279–283.
CSMRCSMR-2008-MendeBKM #clone detection #evolution #product line #using
Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
ICPCICPC-2008-RoyC #clone detection #comparison
Scenario-Based Comparison of Clone Detection Techniques (CKR, JRC), pp. 153–162.
ICPCICPC-2008-RoyC08a #flexibility #named #normalisation #pretty-printing #using
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
ICSMEICSM-2008-TallamTG #concurrent #parallel #slicing #source code #thread
Dynamic slicing of multithreaded programs for race detection (ST, CT, RG), pp. 97–106.
MSRMSR-2008-ChangM #evaluation #source code
Evaluation of source code copy detection methods on freebsd (HFC, AM), pp. 61–66.
MSRMSR-2008-ThummalapentaX #framework #mining #named #open source #repository #web
SpotWeb: detecting framework hotspots via mining open source repositories on the web (ST, TX), pp. 109–112.
MSRMSR-2008-YoshimuraNHK #analysis #approach #named #product line #variability
FAVE: factor analysis based approach for detecting product line variability from change history (KY, FN, KH, TK), pp. 11–18.
SCAMSCAM-2008-PentaCA #evolution #source code
The Evolution and Decay of Statically Detected Source Code Vulnerabilities (MDP, LC, LA), pp. 101–110.
SCAMSCAM-2008-WangZZ #automation #model checking #program analysis
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
WCREWCRE-2008-GuoZ
Detecting Clones in Business Applications (JG, YZ), pp. 91–100.
WCREWCRE-2008-IshioDMI #java #mining #source code
Mining Coding Patterns to Detect Crosscutting Concerns in Java Programs (TI, HD, TM, KI), pp. 123–132.
GT-VMTGT-VMT-2006-LambersEO08 #graph transformation #performance
Efficient Conflict Detection in Graph Transformation Systems by Essential Critical Pairs (LL, HE, FO), pp. 17–26.
CHICHI-2008-Kaneko
Detecting the direction of listening with the emg signals measured behind ears (NK), pp. 535–538.
CHICHI-2008-RanjanBB
Improving meeting capture by applying television production principles with audio and motion detection (AR, JPB, RB), pp. 227–236.
ICEISICEIS-AIDSS-2008-BezerraW #algorithm #process
Anomaly Detection Algorithms in Business Process Logs (FdLB, JW), pp. 11–18.
ICEISICEIS-AIDSS-2008-Martin-ToralSD #corpus #documentation
Detection of Incoherences in a Technical and Normative Document Corpus (SMT, GISP, YAD), pp. 282–287.
ICEISICEIS-HCI-2008-ConciNPS #algorithm
Comparing Color and Texture-Based Algorithms for Human Skin Detection (AC, EN, JJP, ÁS), pp. 166–173.
CIKMCIKM-2008-AlqadahB08a #clustering #set
Detecting significant distinguishing sets among bi-clusters (FA, RB), pp. 1455–1456.
CIKMCIKM-2008-DuWW #community #network
Overlapping community structure detection in networks (ND, BW, BW), pp. 1371–1372.
CIKMCIKM-2008-FaruquieNCS #information management
Exploiting context to detect sensitive information in call center conversations (TAF, SN, AC, LVS), pp. 1513–1514.
CIKMCIKM-2008-HerschelN #graph #scalability
Scaling up duplicate detection in graph data (MH, FN), pp. 1325–1326.
CIKMCIKM-2008-HuangWL #precise
Achieving both high precision and high recall in near-duplicate detection (LH, LW, XL), pp. 63–72.
CIKMCIKM-2008-JiaYF #peer-to-peer
Spam characterization and detection in peer-to-peer file-sharing systems (DJ, WGY, OF), pp. 329–338.
CIKMCIKM-2008-LiuMG #bound #documentation #identification
Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
CIKMCIKM-2008-LuoYY #realtime #video
Real-time new event detection for video streams (GL, RY, PSY), pp. 379–388.
CIKMCIKM-2008-TsengSC #abstraction #email #novel
A novel email abstraction scheme for spam detection (CYT, PCS, MSC), pp. 1393–1394.
CIKMCIKM-2008-ZhuSC #online
Online spam-blog detection through blog search (LZ, AS, BC), pp. 1347–1348.
ECIRECIR-2008-EreraC #email
Conversation Detection in Email Systems (SE, DC), pp. 498–505.
ECIRECIR-2008-PotthastSG #automation #wiki
Automatic Vandalism Detection in Wikipedia (MP, BS, RG), pp. 663–668.
ICMLICML-2008-DundarWLSR #case study #classification
Polyhedral classifier for target detection: a case study: colorectal cancer (MD, MW, SL, MS, VCR), pp. 288–295.
ICMLICML-2008-SorokinaCRF #interactive #statistics
Detecting statistical interactions with additive groves of trees (DS, RC, MR, DF), pp. 1000–1007.
ICPRICPR-2008-Abdel-HakimF #novel #quantifier
A novel stability quantification of detected interest points in scale-space (AEAH, AAF), pp. 1–4.
ICPRICPR-2008-AnlongH
Frame-skipping tracking for single object with global motion detection (AM, HM), pp. 1–4.
ICPRICPR-2008-Bauckhage #classification #probability
Probabilistic Diffusion Classifiers for Object Detection (CB), pp. 1–4.
ICPRICPR-2008-BellaviaTV #parametricity
A non-parametric scale-based corner detector (FB, DT, CV), pp. 1–4.
ICPRICPR-2008-BelleDS #random #realtime #recognition
Randomized trees for real-time one-step face detection and recognition (VB, TD, SS), pp. 1–4.
ICPRICPR-2008-Bileschi #multi
Object detection at multiple scales improves accuracy (SMB), pp. 1–5.
ICPRICPR-2008-CandamoG #video
Wire detection in low-altitude, urban, and low-quality video frames (JC, DBG), pp. 1–4.
ICPRICPR-2008-ChaeCY #performance
Color filtering-based efficient face detection (YNC, JC, HSY), pp. 1–4.
ICPRICPR-2008-ChangFLI #clustering #kernel #multi
Clustered Microcalcification detection based on a Multiple Kernel Support Vector Machine with Grouped Features (GF-SVM) (TTC, JF, HWL, HHSI), pp. 1–4.
ICPRICPR-2008-ChenHCZL #adaptation #markov #random
Change detection based on adaptive Markov Random Fields (KC, CH, JC, ZZ, HL), pp. 1–4.
ICPRICPR-2008-ChenWWM #generative
GA based feature generation for training cascade object detector (QC, HW, TW, KM), pp. 1–4.
ICPRICPR-2008-ChinGT #2d #image
Exact integral images at generic angles for 2D barcode detection (TJC, HG, NMT), pp. 1–4.
ICPRICPR-2008-ChowdhuryYULS #image
Detection of anatomical landmarks in human colon from computed tomographic colonography images (ASC, JY, RLVUJ, MGL, RMS), pp. 1–4.
ICPRICPR-2008-ChuangHFH #multi #using
Monocular multi-human detection using Augmented Histograms of Oriented Gradients (CHC, SSH, LCF, PYH), pp. 1–4.
ICPRICPR-2008-El-BazGFE #3d #analysis #approach #automation #image #monitoring
A new approach for automatic analysis of 3D low dose CT images for accurate monitoring the detected lung nodules (AEB, GLG, RF, MAEG), pp. 1–4.
ICPRICPR-2008-Farmer #framework #image
Application of the wrapper framework for image object detection (MF), pp. 1–4.
ICPRICPR-2008-FefilatyevG #video
Detection and tracking of marine vehicles in video (SF, DBG), pp. 1–4.
ICPRICPR-2008-GarainD #documentation #empirical #image #word
Stop word detection in compressed textual images: An experiment on indic script documents (UG, AKD), pp. 1–4.
ICPRICPR-2008-GuimaraesPP #approach #difference #distance #graph #using #video
An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
ICPRICPR-2008-GurS #invariant
Non-Abelian invariant feature detection (YG, NAS), pp. 1–4.
ICPRICPR-2008-HanifPN #image
A cascade detector for text detection in natural scene images (SMH, LP, PN), pp. 1–4.
ICPRICPR-2008-HaqueMP #adaptation #generative #multi #robust
Improved Gaussian mixtures for robust object detection by adaptive multi-background generation (MH, MMM, MP), pp. 1–4.
ICPRICPR-2008-HuangLZ
A method of small object detection and tracking based on particle filters (YH, JL, CZ), pp. 1–4.
ICPRICPR-2008-HuangST #using #video
Detecting moving text in video using temporal information (WH, PS, CLT), pp. 1–4.
ICPRICPR-2008-HuAS
Detecting global motion patterns in complex videos (MH, SA, MS), pp. 1–5.
ICPRICPR-2008-HulkkonenH #monitoring
A minimum description length principle based method for signal change detection in machine condition monitoring (JJH, JVH), pp. 1–4.
ICPRICPR-2008-HuWJHG #learning #online
Human reappearance detection based on on-line learning (LH, YW, SJ, QH, WG), pp. 1–4.
ICPRICPR-2008-KadarBS #bound #evolution #image #programming #search-based
Evolving boundary detectors for natural images via Genetic Programming (IK, OBS, MS), pp. 1–4.
ICPRICPR-2008-KaiserH #analysis
Qualitative analysis of spatio-temporal event detectors (BK, GH), pp. 1–4.
ICPRICPR-2008-KazuiMMF #matrix #using
Incoherent motion detection using a time-series Gram matrix feature (MK, MM, SM, HF), pp. 1–5.
ICPRICPR-2008-KimS #consistency #sequence #using #video
Static text region detection in video sequences using color and orientation consistencies (DK, KS), pp. 1–4.
ICPRICPR-2008-KiryatiRIR #realtime #video
Real-time abnormal motion detection in surveillance video (NK, TRR, YI, SR), pp. 1–4.
ICPRICPR-2008-Kita #case study #image #using
A study of change detection from satellite images using joint intensity histogram (YK), pp. 1–4.
ICPRICPR-2008-KonKAT #adaptation #interactive #realtime #using
Adaptive habituation detection to build human computer interactive systems using a real-time cross-modal computation (MK, TK, KA, HT), pp. 1–4.
ICPRICPR-2008-KonyaSGE #algorithm #robust #scalability
A robust front page detection algorithm for large periodical collections (IVK, CS, SG, SE), pp. 1–5.
ICPRICPR-2008-KuksaHP #kernel #performance
Fast protein homology and fold detection with sparse spatial sample kernels (PPK, PHH, VP), pp. 1–4.
ICPRICPR-2008-LampertO #image #linear
Active contour detection of linear patterns in spectrogram images (TAL, SO), pp. 1–4.
ICPRICPR-2008-LangerK #approach #image #realtime #robust
A new hierarchical approach in robust real-time image feature detection and matching (ML, KDK), pp. 1–4.
ICPRICPR-2008-LeeWN #performance #using
Very fast ellipse detection using GPU-based RHT (JKL, BAW, TSN), pp. 1–4.
ICPRICPR-2008-LiuS08a #robust #using
Robust outdoor text detection using text intensity and shape features (ZL, SS), pp. 1–4.
ICPRICPR-2008-LiuZDY #learning #sequence #video
Video attention: Learning to detect a salient object sequence (TL, NZ, WD, ZY), pp. 1–4.
ICPRICPR-2008-LuJZ #effectiveness #segmentation
An effective method for detection and segmentation of the body of human in the view of a single stationary camera (HL, CJ, RZ), pp. 1–4.
ICPRICPR-2008-MaillardLD #image
Detection of digital processing of images through a realistic model of CCD noise (JBM, DL, FD), pp. 1–4.
ICPRICPR-2008-MakiKSS #automation #interactive
Image-based automatic detection of indoor scene events and interactive inquiry (KM, NK, NS, YS), pp. 1–4.
ICPRICPR-2008-MaL08a #approach #concept #optimisation #performance #semantics
An efficient gradient computation approach to discriminative fusion optimization in semantic concept detection (CM, CHL), pp. 1–4.
ICPRICPR-2008-MatsuiCM #automation
Bayesian sequential face detection with automatic re-initialization (AM, SC, TM), pp. 1–4.
ICPRICPR-2008-MengLMW
Directional entropy feature for human detection (LM, LL, SM, WW), pp. 1–4.
ICPRICPR-2008-MieziankoP #multi
Detecting changes in multilayered orthoimages with spatiotemporal texture blocks (RM, DP), pp. 1–4.
ICPRICPR-2008-MohantaSC #multi #using
Detection of representative frames of a shot using multivariate Wald-Wolfowitz test (PPM, SKS, BC), pp. 1–4.
ICPRICPR-2008-MuraiF #bound #using #video
Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPRICPR-2008-NaturelO #approach #statistics
Detecting queues at vending machines: A statistical layered approach (XN, JMO), pp. 1–4.
ICPRICPR-2008-NingXZGH #difference #learning
Temporal difference learning to detect unsafe system states (HN, WX, YZ, YG, TSH), pp. 1–4.
ICPRICPR-2008-PanBS #image #representation #using
Text detection from scene images using sparse representation (WP, TDB, CYS), pp. 1–5.
ICPRICPR-2008-PiciarelliMF
Anomalous trajectory patterns detection (CP, CM, GLF), pp. 1–4.
ICPRICPR-2008-RicharzPF #3d #gesture #realtime
Real-time detection and interpretation of 3D deictic gestures for interactionwith an intelligent environment (JR, TP, GAF), pp. 1–4.
ICPRICPR-2008-RognvaldssonPBS #approach #fault #multi #self
A self-organized approach for unsupervised fault detection in multiple systems (TSR, GP, SB, MS), pp. 1–4.
ICPRICPR-2008-SezerMAC #markov #named
NorMaL: Non-compact Markovian Likelihood for change detection (OGS, JLM, YA, DBC), pp. 1–4.
ICPRICPR-2008-ShenZL #higher-order #programming #using
Deformable surface stereo tracking-by-detection using Second Order Cone Programming (SS, YZ, YL), pp. 1–4.
ICPRICPR-2008-ShivakumaraHT #performance #using #video
Efficient video text detection using edge features (PS, WH, CLT), pp. 1–4.
ICPRICPR-2008-ShoemakerBHBK #performance
Detecting and ordering salient regions for efficient browsing (LS, REB, LOH, KWB, WPK), pp. 1–4.
ICPRICPR-2008-SimonB #estimation #geometry #multi #realtime
Detection of the intersection lines in multiplanar environments: Application to real-time estimation of the camera-scene geometry (GS, MOB), pp. 1–4.
ICPRICPR-2008-SmithLN
Ballot mark detection (EHBS, DPL, GN), pp. 1–4.
ICPRICPR-2008-SrihariNNL #clique #network
Detecting hubs and quasi cliques in scale-free networks (SS, HKN, KN, HWL), pp. 1–4.
ICPRICPR-2008-SudoOTKA #incremental #learning #online
Online anomal movement detection based on unsupervised incremental learning (KS, TO, HT, HK, KA), pp. 1–4.
ICPRICPR-2008-ThomeA #bottom-up #invariant
A bottom-up, view-point invariant human detector (NT, SA), pp. 1–4.
ICPRICPR-2008-VikstenNK
Point-of-interest detection for range data (FV, KN, MK), pp. 1–4.
ICPRICPR-2008-VisentiniSF #online
On-line boosted cascade for object detection (IV, LS, GLF), pp. 1–4.
ICPRICPR-2008-WangCS
Detecting shadows of moving vehicles based on HMM (YW, HDC, JS), pp. 1–4.
ICPRICPR-2008-WetzkerPKBAM #generative #probability #roadmap #social #using
Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing (RW, TP, AK, CB, TA, FM), pp. 1–4.
ICPRICPR-2008-WuJP #effectiveness #linear
Effective features based on normal linear structures for detecting microcalcifications in mammograms (ZQW, JJ, YP), pp. 1–4.
ICPRICPR-2008-WuZWGL #invariant #video #visual notation
Invariant visual patterns for video copy detection (XW, YZ, YW, JG, JL), pp. 1–4.
ICPRICPR-2008-XuZW #feature model #semantics
Semantic feature extraction for accurate eye corner detection (CX, YZ, ZW), pp. 1–4.
ICPRICPR-2008-YamaguchiH #image
Improved percolation-based method for crack detection in concrete surface images (TY, SH), pp. 1–4.
ICPRICPR-2008-YangQ #analysis #component #independence #network #using
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-YingZ #performance #using
Efficient detection of projected concentric circles using four intersection points on a secant line (XY, HZ), pp. 1–4.
ICPRICPR-2008-YuLL #recognition #robust #video
Robust time recognition of video clock based on digit transition detection and digit-sequence recognition (XY, YL, WSL), pp. 1–4.
ICPRICPR-2008-ZaidiS #algorithm
Confidence rated boosting algorithm for generic object detection (NAZ, DS), pp. 1–4.
ICPRICPR-2008-ZareG #process #using
Endmember detection using the Dirichlet process (AZ, PDG), pp. 1–4.
ICPRICPR-2008-ZhangGZ #modelling
Complex background modeling and motion detection based on Texture Pattern Flow (BZ, YG, BZ), pp. 1–4.
ICPRICPR-2008-ZhangK #automation
Automatic road sign detection method based on Color Barycenters Hexagon model (QZ, SiK), pp. 1–4.
ICPRICPR-2008-ZhengW #precise #robust
Robust and precise eye detection based on locally selective projection (YZ, ZW), pp. 1–4.
KDDKDD-2008-BoriahKSPK #case study
Land cover change detection: a case study (SB, VK, MS, CP, SAK), pp. 857–865.
KDDKDD-2008-ChowGS #privacy #using
Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
KDDKDD-2008-DasSN #category theory #dataset
Anomaly pattern detection in categorical datasets (KD, JGS, DBN), pp. 169–176.
KDDKDD-2008-KriegelSZ
Angle-based outlier detection in high-dimensional data (HPK, MS, AZ), pp. 444–452.
KDDKDD-2008-ParikhS #query #realtime #scalability
Scalable and near real-time burst detection from eCommerce queries (NP, NS), pp. 972–980.
KDDKDD-2008-YangZYW
Local peculiarity factor and its application in outlier detection (JY, NZ, YY, JW), pp. 776–784.
SEKESEKE-2008-AltahatET #analysis #diagrams #graph transformation #interactive #uml
Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
SEKESEKE-2008-CemerlicYK #network
Network Intrusion Detection Based on Bayesian Networks (AC, LY, JMK), pp. 791–794.
SEKESEKE-2008-HuS #design pattern #dynamic analysis #java #source code
Dynamic Analysis and Design Pattern Detection in Java Programs (LH, KS), pp. 842–846.
SEKESEKE-2008-KraftBS #clone detection
Cross-language Clone Detection (NAK, BWB, RKS), pp. 54–59.
SEKESEKE-2008-ParveenATMF #analysis #probability #towards
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls (TP, WHA, SRT, GAM, RF), pp. 802–807.
SIGIRSIGIR-2008-CanKBKOU
Bilkent news portal: a personalizable system with new event detection and tracking capabilities (FC, SK, OB, SK, HCO, EU), p. 885.
SIGIRSIGIR-2008-Chernov
Task detection for activity-based desktop search (SC), p. 894.
SIGIRSIGIR-2008-ClementsVR #retrieval #social
Detecting synonyms in social tagging systems to improve content retrieval (MC, APdV, MJTR), pp. 739–740.
SIGIRSIGIR-2008-GoharianM #documentation #on the
On document splitting in passage detection (NG, SSRM), pp. 833–834.
SIGIRSIGIR-2008-SeoC #reuse
Local text reuse detection (JS, WBC), pp. 571–578.
SIGIRSIGIR-2008-TanWC #sentiment #using
Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
SIGIRSIGIR-2008-TheobaldSP #named #performance #robust #scalability #web
SpotSigs: robust and efficient near duplicate detection in large web collections (MT, JS, AP), pp. 563–570.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #using
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
SPLCSPLC-2008-Dalgarno #clone detection #product line
Jump-Starting Software Product Lines with Clone Detection (AMD), p. 351.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #using
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
OOPSLAOOPSLA-2008-ArnoldVY #fault #named #performance #runtime
QVM: an efficient runtime for detecting defects in deployed systems (MA, MTV, EY), pp. 143–162.
AdaEuropeAdaEurope-2008-RazaV #flexibility #framework #named #parallel #source code
RCanalyser: A Flexible Framework for the Detection of Data Races in Parallel Programs (AR, GV), pp. 226–239.
PLDIPLDI-2008-ChughVJL #analysis #concurrent #data flow #source code #using
Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
SASSAS-2008-BalakrishnanSIWG #analysis #named #refinement
SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement (GB, SS, FI, OW, AG), pp. 238–254.
ASEASE-2008-Dominguez #feature model #interactive
Feature Interaction Detection in the Automotive Domain (ALJD), pp. 521–524.
ASEASE-2008-ThummalapentaX #framework #mining #named #open source #source code #web
SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web (ST, TX), pp. 327–336.
FSEFSE-2008-LeS #named
Marple: a demand-driven path-sensitive buffer overflow detector (WL, MLS), pp. 272–282.
FSEFSE-2008-ParkS #concurrent #random #source code
Randomized active atomicity violation detection in concurrent programs (CSP, KS), pp. 135–145.
FSEFSE-2008-SamaRWE #adaptation #fault #modelling
Model-based fault detection in context-aware adaptive applications (MS, DSR, ZW, SGE), pp. 261–271.
ICSEICSE-2008-BlancMMM #consistency #nondeterminism
Detecting model inconsistency through operation-based model construction (XB, IM, AM, TM), pp. 511–520.
ICSEICSE-2008-DeissenboeckHJSWGT #clone detection #development #modelling
Clone detection in automotive model-based development (FD, BH, EJ, BS, SW, JFG, ST), pp. 603–612.
ICSEICSE-2008-GabelJS #scalability #semantics
Scalable detection of semantic clones (MG, LJ, ZS), pp. 321–330.
ICSEICSE-2008-HammerDVT
Dynamic detection of atomic-set-serializability violations (CH, JD, MV, FT), pp. 231–240.
ICSEICSE-2008-WangZXAS #approach #debugging #execution #natural language #using
An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
ICSEICSE-2008-WassermannS #static analysis
Static detection of cross-site scripting vulnerabilities (GW, ZS), pp. 171–180.
ICSEICSE-2008-XuR #java #memory management #precise #profiling #using
Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
SACSAC-2008-AbbesBR
An inference system for detecting firewall filtering rules anomalies (TA, AB, MR), pp. 2122–2128.
SACSAC-2008-AdnaneSBM #behaviour #reasoning #trust
Autonomic trust reasoning enables misbehavior detection in OLSR (AA, RTdSJ, CB, LM), pp. 2006–2013.
SACSAC-2008-AmatoCCMTVGLGM #analysis
A web-based system for the collection and analysis of spectra signals for early detection of voice alterations (FA, MC, CC, FM, GT, PV, AG, NL, SG, CM), pp. 1405–1409.
SACSAC-2008-BezerraW #algorithm #process
Anomaly detection algorithms in logs of process aware systems (FdLB, JW), pp. 951–952.
SACSAC-2008-ChenXN #analysis #fault #specification
A detectability analysis of fault classes for Boolean specifications (ZC, BX, CN), pp. 826–830.
SACSAC-2008-CruzBDSTVCCTM #approach #named #workflow
OrthoSearch: a scientific workflow approach to detect distant homologies on protozoans (SMSdC, VB, AMRD, ES, FT, CV, MLMC, RRCC, DAT, MM), pp. 1282–1286.
SACSAC-2008-DiamantiniP
Borderline detection by Bayes vector quantizers (CD, DP), pp. 904–908.
SACSAC-2008-DongSZ #design pattern
Design pattern detection by template matching (JD, YS, YZ), pp. 765–769.
SACSAC-2008-FonsecaVM #data access #online #using
Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
SACSAC-2008-KemalisT #approach #injection #named
SQL-IDS: a specification-based approach for SQL-injection detection (KK, TT), pp. 2153–2158.
SACSAC-2008-KuangZ #algorithm #using
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-LiG #network #optimisation #using
TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
SACSAC-2008-LoTP #hardware #implementation #network #regular expression
Hardware implementation for network intrusion detection rules with regular expression support (CTDL, YGT, KP), pp. 1535–1539.
SACSAC-2008-SchiabelSA #image #segmentation
Segmentation technique for detecting suspect masses in dense breast digitized images as a tool for mammography CAD schemes (HS, VTS, MFA), pp. 1333–1337.
SACSAC-2008-SeifertWK #algorithm #divide and conquer #interactive #paradigm
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots (CS, IW, PK), pp. 1426–1432.
SACSAC-2008-SpinosaCG #clustering #concept #data type #network #novel
Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks (EJS, ACPLFdC, JG), pp. 976–980.
SACSAC-2008-TanWWC #problem #semantics #using
Using unlabeled data to handle domain-transfer problem of semantic detection (ST, YW, GW, XC), pp. 896–903.
SACSAC-2008-YuB #effectiveness #multi #performance
A fast and effective method to detect multiple least significant bits steganography (XY, NB), pp. 1443–1447.
LDTALDTA-2007-Schmitz08 #ambiguity
An Experimental Ambiguity Detection Tool (SS), pp. 69–84.
CASECASE-2008-HooverMR #3d #image #matrix #using
Pose detection of 3-D objects using images sampled on SO(3), spherical harmonics, and wigner-D matrices (RCH, AAM, RGR), pp. 47–52.
CASECASE-2008-LiuWZ #multi #network
Cooperative multipath routing and relay based on noncoherent detection in wireless sensor networks (LL, ZW, MZ), pp. 128–132.
CASECASE-2008-SolisT #performance
Enabling autonomous systems to perceptually detect human performance improvements and their applications (JS, AT), pp. 259–264.
CASECASE-2008-WangSF #automation #difference #equation
Partial differential equation-based GPR signature discrimination for automatic detection of bridge deck delamination (ZWW, GGS, TF), pp. 431–435.
DACDAC-2008-KurimotoSAYOTS #fault #optimisation #scalability
Phase-adjustable error detection flip-flops with 2-stage hold driven optimization and slack based grouping scheme for dynamic voltage scaling (MK, HS, RA, TY, HO, HT, HS), pp. 884–889.
DACDAC-2008-ReddyPL #on the #testing
On tests to detect via opens in digital CMOS circuits (SMR, IP, CL), pp. 840–845.
DATEDATE-2008-AltCS #algorithm #architecture #hardware #realtime
Hardware/software architecture of an algorithm for vision-based real-time vehicle detection in dark environments (NA, CC, WS), pp. 176–181.
DATEDATE-2008-ChoudhuryM #approximate #concurrent #fault #logic
Approximate logic circuits for low overhead, non-intrusive concurrent error detection (MRC, KM), pp. 903–908.
DATEDATE-2008-DasMJZMC #analysis #component #implementation #network #performance
An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
DATEDATE-2008-FeinsteinTM #equivalence #logic #using
Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits (DYF, MAT, DMM), pp. 1378–1381.
DATEDATE-2008-FrechetteL #algorithm #fault #self
Error Detection/Correction in DNA Algorithmic Self-Assembly (SF, FL), pp. 1079–1082.
DATEDATE-2008-KleanthousS #named
CATCH: A Mechanism for Dynamically Detecting Cache-Content-Duplication and its Application to Instruction Caches (MK, YS), pp. 1426–1431.
DATEDATE-2008-LiBXNPC #architecture #optimisation #parallel #programmable
Optimizing Near-ML MIMO Detector for SDR Baseband on Parallel Programmable Architectures (ML, BB, WX, DN, LVdP, FC), pp. 444–449.
DATEDATE-2008-LinPBB
Physically-Aware N-Detect Test Pattern Selection (YTL, OP, NKB, RDB), pp. 634–639.
DATEDATE-2008-PomeranzR #fault #logic
A Bridging Fault Model Where Undetectable Faults Imply Logic Redundancy (IP, SMR), pp. 1166–1171.
DATEDATE-2008-VemuJAPG #concurrent #fault #logic #low cost
A low-cost concurrent error detection technique for processor control logic (RV, AJ, JAA, SP, RG), pp. 897–902.
DATEDATE-2008-WolffPBC #analysis #problem #towards
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.
HPDCHPDC-2008-ShrinivasN #data mining #grid #mining
Issues in applying data mining to grid job failure detection and diagnosis (LS, JFN), pp. 239–240.
ISMMISMM-2008-JungY #memory management #summary
Practical memory leak detector based on parameterized procedural summaries (YJ, KY), pp. 131–140.
LCTESLCTES-2008-LeeMK #compilation #embedded #heuristic #java
Enhanced hot spot detection heuristics for embedded java just-in-time compilers (SWL, SMM, SMK), pp. 13–22.
FASEFASE-2008-MohaGMD #algorithm #analysis #design #fault
A Domain Analysis to Specify Design Defects and Generate Detection Algorithms (NM, YGG, AFLM, LD), pp. 276–291.
ICLPICLP-2008-GebserSTUV #biology #consistency #network #nondeterminism #programming #scalability #set
Detecting Inconsistencies in Large Biological Networks with Answer Set Programming (MG, TS, ST, BU, PV), pp. 130–144.
ICLPICLP-2008-Tsitovich #model checking #security #using
Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
ICSTICST-2008-KolovosPP #consistency #modelling #nondeterminism
Detecting and Repairing Inconsistencies across Heterogeneous Models (DSK, RFP, FP), pp. 356–364.
ICSTICST-2008-StreckerM #fault #testing #user interface
Relationships between Test Suites, Faults, and Fault Detection in GUI Testing (JS, AMM), pp. 12–21.
ISSTAISSTA-2008-BoddenH #aspectj #concurrent #effectiveness #named #using
Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
ISSTAISSTA-2008-TianNGT #concurrent #recognition
Dynamic recognition of synchronization operations for improved data race detection (CT, VN, RG, ST), pp. 143–154.
DocEngDocEng-2007-SaccolEGZ #xml
XML version detection (DdBS, NE, RdMG, CZ), pp. 79–88.
ICDARICDAR-2007-AradhyeM
Exploiting Videotext _Events_ for Improved Videotext Detection (HBA, GKM), pp. 894–898.
ICDARICDAR-2007-CeciBPM #approach #data mining #mining #order
A Data Mining Approach to Reading Order Detection (MC, MB, GP, DM), pp. 924–928.
ICDARICDAR-2007-EgoziDCF #algorithm
An EM Based Algorithm for Skew Detection (AE, ID, JC, MCF), pp. 277–281.
ICDARICDAR-2007-LamiroyFG #robust
Robust Circle Detection (BL, LF, OG), pp. 526–530.
ICDARICDAR-2007-LiwickiIB #online #programming #using
On-Line Handwritten Text Line Detection Using Dynamic Programming (ML, EI, HB), pp. 447–451.
ICDARICDAR-2007-LouloudisGH #approach #documentation #using
Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
ICDARICDAR-2007-LuT #automation #documentation
Automatic Detection of Document Script and Orientation (SJL, CLT), pp. 237–241.
ICDARICDAR-2007-LuWT #documentation #performance
Fast and Accurate Detection of Document Skew and Orientation (SJL, JW, CLT), pp. 684–688.
ICDARICDAR-2007-QuiniouA #fault #network #online #recognition #using
Use of a Confusion Network to Detect and Correct Errors in an On-Line Handwritten Sentence Recognition System (SQ, ÉA), pp. 382–386.
ICDARICDAR-2007-RusinolLD #visual notation
Camera-Based Graphical Symbol Detection (MR, JL, PD), pp. 884–888.
ICDARICDAR-2007-SubramanianNDC
Character-Stroke Detection for Text-Localization and Extraction (KS, PN, MD, DAC), pp. 33–37.
ICDARICDAR-2007-SuZHZ07a
Skew Detection for Chinese Handwriting by Horizontal Stroke Histogram (THS, TWZ, HJH, YZ), pp. 899–903.
ICDARICDAR-2007-WillemsV #approach #interactive #network
A Bayesian Network Approach to Mode Detection for Interactive Maps (DW, LV), pp. 869–873.
ICDARICDAR-2007-ZhuD #automation #documentation
Automatic Document Logo Detection (GZ, DSD), pp. 864–868.
SIGMODSIGMOD-2007-LeonardiB #database #named #relational #xml
XANADUE: a system for detecting changes to XML data in tree-unaware relational databases (EL, SSB), pp. 1137–1140.
SIGMODSIGMOD-2007-LuoTY #adaptation #realtime
Resource-adaptive real-time new event detection (GL, CT, PSY), pp. 497–508.
VLDBVLDB-2007-HaasHM #dependence #feedback #query
Detecting Attribute Dependencies from Query Feedback (PJH, FH, VM), pp. 830–841.
VLDBVLDB-2007-JorwekarFRS #automation
Automating the Detection of Snapshot Isolation Anomalies (SJ, AF, KR, SS), pp. 1263–1274.
VLDBVLDB-2007-ShenZHSZ #named #realtime #video
UQLIPS: A Real-time Near-duplicate Video Clip Detection System (HTS, XZ, ZH, JS, XZ), pp. 1374–1377.
ITiCSEITiCSE-2007-JiWC #source code
A source code linearization technique for detecting plagiarized programs (JHJ, GW, HGC), pp. 73–77.
SIGITESIGITE-2007-LeungC07a #approach #automation #natural language
A natural language processing approach to automatic plagiarism detection (CHL, YYC), pp. 213–218.
ICPCICPC-2007-LienhardGN #dependence
Tracking Objects to Detect Feature Dependencies (AL, OG, ON), pp. 59–68.
ICPCICPC-2007-PetterssonL #approach #design pattern
A Non-conservative Approach to Software Pattern Detection (NP, WL), pp. 189–198.
ICPCICPC-2007-ZouGH #interactive
Detecting Interaction Coupling from Task Interaction Histories (LZ, MWG, AEH), pp. 135–144.
ICSMEICSM-2007-BrandBS #analysis #debugging
Evidence-Based Analysis and Inferring Preconditions for Bug Detection (DB, MB, VCS), pp. 44–53.
ICSMEICSM-2007-Chaabane #analysis
Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
ICSMEICSM-2007-McMasterM #analysis #fault #probability #reduction #testing
Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction (SM, AMM), pp. 335–344.
ICSMEICSM-2007-ShaoKP #empirical #evaluation #parallel #semantics
Evaluation of Semantic Interference Detection in Parallel Changes: an Exploratory Experiment (DS, SK, DEP), pp. 74–83.
MSRMSR-2007-BirdGD
Detecting Patch Submission and Acceptance in OSS Projects (CB, AG, PTD), p. 26.
MSRMSR-2007-WeissgerberPB #data mining #developer #how #mining #visual notation
Visual Data Mining in Software Archives to Detect How Developers Work Together (PW, MP, MB), p. 9.
PASTEPASTE-2007-LeS #analysis
Refining buffer overflow detection via demand-driven path-sensitive analysis (WL, MLS), pp. 63–68.
SCAMSCAM-2007-Larson #debugging #framework #named #tool support
SUDS: An Infrastructure for Creating Bug Detection Tools (EL), pp. 123–132.
WCREWCRE-2007-EvansFM #abstraction #clone detection
Clone Detection via Structural Abstraction (WSE, CWF, FM), pp. 150–159.
WCREWCRE-2007-SousaMUK #execution
Detecting Implied Scenarios from Execution Traces (FCdS, NCM, SU, JK), pp. 50–59.
ICALPICALP-2007-Schmitz #ambiguity #context-free grammar
Conservative Ambiguity Detection in Context-Free Grammars (SS), pp. 692–703.
CHICHI-2007-HurstHM
Dynamic detection of novice vs. skilled use without a task model (AH, SEH, JM), pp. 271–280.
CHICHI-2007-IqbalB #comprehension #interactive #modelling
Understanding and developing models for detecting and differentiating breakpoints during interactive tasks (STI, BPB), pp. 697–706.
CHICHI-2007-ThompsonRYB #interface #visual notation
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection (RST, EMR, WY, BPB), p. 1205.
HCIDHM-2007-Su #performance #precise
Enhancing Sense of Reality by Efficient and Precise Collision Detection in Virtual Environments (CJS), pp. 969–978.
HCIDHM-2007-ZhuXYM #novel
A Novel Method for Cloth-Body Collision Detection (XZ, SX, YY, TM), pp. 1056–1063.
HCIHCI-AS-2007-SaC07a #learning #ubiquitous
Detecting Learning Difficulties on Ubiquitous Scenarios (MdS, LC), pp. 235–244.
HCIHCI-IDU-2007-FujiokaTKO #coordination #problem #usability
Tool for Detecting Webpage Usability Problems from Mouse Click Coordinate Logs (RF, RT, YK, HO), pp. 438–445.
HCIHCI-IDU-2007-HwangS #problem #usability #what
What Makes Evaluators to Find More Usability Problems?: A Meta-analysis for Individual Detection Rates (WH, GS), pp. 499–507.
HCIHCI-IPT-2007-ParkJ #automation #documentation #image #mobile #using #word
Automatic Word Detection System for Document Image Using Mobile Devices (AP, KJ), pp. 438–444.
HCIHCI-MIE-2007-ChanCCHH #multi #using
A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
HCIHCI-MIE-2007-KimKEKASK #adaptation #realtime #using
Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter (JHK, BDK, JSE, CK, SHA, BJS, SKK), pp. 669–678.
HCIHCI-MIE-2007-PeterSVUNJKG #monitoring #performance #usability
EREC-II in Use — Studies on Usability and Suitability of a Sensor System for Affect Detection and Human Performance Monitoring (CP, RS, JV, BU, NN, HJ, KK, RG), pp. 465–474.
HCIHIMI-IIE-2007-MoradiKSH #algorithm #navigation #realtime
A Real-Time GPU-Based Wall Detection Algorithm for Mapping and Navigation in Indoor Environments (HM, EK, DNS, JH), pp. 1072–1077.
HCIHIMI-MTT-2007-CaoXR
Moving Object Contour Detection Based on S-T Characteristics in Surveillance (YyC, GX, TR), pp. 575–583.
HCIHIMI-MTT-2007-TogawaKY #communication #mining #network #peer-to-peer #using
Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining (ST, KK, YY), pp. 769–778.
CAiSECAiSE-2007-EderW #comparison #graph #ontology #using
Change Detection in Ontologies Using DAG Comparison (JE, KW), pp. 21–35.
ICEISICEIS-AIDSS-2007-SkaruzSB #approach #network #sql
Recurrent Neural Networks Approach to The Detection of SQL Attacks (JS, FS, PB), pp. 191–197.
ICEISICEIS-EIS-2007-AmritH #matrix #problem #process
Matrix Based Problem Detection in the Application of Software Process Patterns (CA, JvH), pp. 316–320.
ICEISICEIS-SAIC-2007-ChenC #bottom-up #difference #process
A Simulation-Based Difference Detection Technique for Bottom-Up Process Reconciliation (XC, PWHC), pp. 72–77.
ICEISICEIS-SAIC-2007-DandashWLS #internet
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection (OD, YW, PDL, BS), pp. 57–62.
CIKMCIKM-2007-AngiulliF07a
Detecting distance-based outliers in streams of data (FA, FF), pp. 811–820.
CIKMCIKM-2007-BrzeskiIK
Leveraging context in user-centric entity detection systems (VvB, UI, RK), pp. 691–700.
CIKMCIKM-2007-LeitaoCW #fuzzy #similarity #xml
Structure-based inference of xml similarity for fuzzy duplicate detection (LL, PC, MW), pp. 293–302.
ECIRECIR-2007-ShahE #documentation #metric #representation #topic #using
Use of Topicality and Information Measures to Improve Document Representation for Story Link Detection (CS, KE), pp. 393–404.
ICMLICML-2007-HaiderBS #clustering #email #streaming
Supervised clustering of streaming data for email batch detection (PH, UB, TS), pp. 345–352.
KDDKDD-2007-CurryGLVB #case study #scalability #set
Detecting changes in large data sets of payment card data: a case study (CC, RLG, DL, SV, JB), pp. 1018–1022.
KDDKDD-2007-DasS #category theory #dataset
Detecting anomalous records in categorical datasets (KD, JGS), pp. 220–229.
KDDKDD-2007-FastFMTJGK #preprocessor #relational
Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
KDDKDD-2007-JoLG #correlation #graph #research #topic
Detecting research topics via the correlation between graphs and texts (YJ, CL, CLG), pp. 370–379.
KDDKDD-2007-LeskovecKGFVG #effectiveness #network
Cost-effective outbreak detection in networks (JL, AK, CG, CF, JMV, NSG), pp. 420–429.
KDDKDD-2007-RaoBFSON #machine learning #named
LungCAD: a clinically approved, machine learning system for lung cancer detection (RBR, JB, GF, MS, NO, DPN), pp. 1033–1037.
KDDKDD-2007-SongWJR #multi #statistics
Statistical change detection for multi-dimensional data (XS, MW, CMJ, SR), pp. 667–676.
KDDKDD-2007-TandonC #network #validation
Weighting versus pruning in rule validation for detecting network and host anomalies (GT, PKC), pp. 697–706.
KDDKDD-2007-YankovKMCZ #scalability
Detecting time series motifs under uniform scaling (DY, EJK, JM, BYcC, VBZ), pp. 844–853.
KDDKDD-2007-YeWLY #named
IMDS: intelligent malware detection system (YY, DW, TL, DY), pp. 1043–1047.
KDDKDD-2007-ZhengSWW #generative #optimisation
Joint optimization of wrapper generation and template detection (SZ, RS, JRW, DW), pp. 894–902.
MLDMMLDM-2007-LateckiLP #kernel
Outlier Detection with Kernel Density Functions (LJL, AL, DP), pp. 61–75.
MLDMMLDM-2007-MicarelliS #approach
A Case-Based Approach to Anomaly Intrusion Detection (AM, GS), pp. 434–448.
MLDMMLDM-2007-SadoddinG #case study #comparative #data mining #machine learning #mining
A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (RS, AAG), pp. 404–418.
SEKESEKE-2007-GokhaleL #multi
Multi-level Anomaly Detection with Application-Level Data (SSG, JL), p. 718–?.
SEKESEKE-2007-KanaskarSR #analysis #approach #using
A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
SEKESEKE-2007-LiangS #aspect-oriented #composition #specification
Modular Specification of Aspect-oriented Systems and Aspect Conflicts Detection (HL, JS), pp. 77–80.
SEKESEKE-2007-SantosH #algorithm #semantics #xml
A Semantical Change Detection Algorithm for XML (RCS, CSH), pp. 438–443.
SIGIRSIGIR-2007-CastilloDGMS #using #web
Know your neighbors: web spam detection using the web topology (CC, DD, AG, VM, FS), pp. 423–430.
SIGIRSIGIR-2007-FernandezL #analysis #using
Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
SIGIRSIGIR-2007-HeCL
Analyzing feature trajectories for event detection (QH, KC, EPL), pp. 207–214.
SIGIRSIGIR-2007-HuffmanLSWYR #evaluation #multi
Multiple-signal duplicate detection for search evaluation (SBH, ARL, APS, HWT, FY, HR), pp. 223–230.
SIGIRSIGIR-2007-LiQLY #categorisation #clustering
Detecting, categorizing and clustering entity mentions in Chinese text (WL, DQ, QL, CY), pp. 647–654.
SIGIRSIGIR-2007-MamouRS #independence
Vocabulary independent spoken term detection (JM, BR, OS), pp. 615–622.
SIGIRSIGIR-2007-Potthast #similarity #wiki
Wikipedia in the pocket: indexing technology for near-duplicate detection and high similarity search (MP), p. 909.
SIGIRSIGIR-2007-RoussinovFS #word
Detecting word substitutions: PMI vs. HMM (DR, SF, DBS), pp. 885–886.
SIGIRSIGIR-2007-SunMGYZ #documentation #multi #segmentation #topic
Topic segmentation with shared topic detection and alignment of multiple documents (BS, PM, CLG, JY, HZ), pp. 199–206.
SIGIRSIGIR-2007-ZhangZW
New event detection based on indexing-tree and named entity (KZ, JZ, LGW), pp. 215–222.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-MassicotteCBL #modelling
Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-MassicotteCBL #modelling
Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
AdaEuropeAdaEurope-2007-BliebergerBM #ada #multi #source code #static analysis
Static Detection of Livelocks in Ada Multitasking Programs (JB, BB, RM), pp. 69–83.
AdaEuropeAdaEurope-2007-LauLCY #fault #on the
On Detecting Double Literal Faults in Boolean Expressions (MFL, YL, TYC, YTY), pp. 55–68.
PLDIPLDI-2007-CheremPR #analysis #memory management #using
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
PLDIPLDI-2007-DilligDA #consistency #fault #nondeterminism #semantics #using
Static error detection using semantic inconsistency inference (ID, TD, AA), pp. 435–445.
POPLPOPL-2007-JumpM #garbage collection #memory management #named
Cork: dynamic memory leak detection for garbage-collected languages (MJ, KSM), pp. 31–38.
POPLPOPL-2007-NaikA #alias #concurrent
Conditional must not aliasing for static race detection (MN, AA), pp. 327–338.
POPLPOPL-2007-PredaCJD #approach #semantics
A semantics-based approach to malware detection (MDP, MC, SJ, SKD), pp. 377–388.
PPDPPPDP-2007-Sagonas #erlang #fault #source code #static analysis #using
Detecting defects in Erlang programs using static analysis (KFS), p. 37.
ASEASE-2007-MohaG #design #fault #named
Decor: a tool for the detection of design defects (NM, YGG), pp. 527–528.
ASEASE-2007-TairasGB #clone detection #visualisation
Visualizing clone detection results (RT, JG, IDB), pp. 549–550.
ASEASE-2007-TanejaDX #api #automation #library #refactoring
Automated detection of api refactorings in libraries (KT, DD, TX), pp. 377–380.
ESEC-FSEESEC-FSE-2007-BasitJ #clone detection #flexibility #performance
Efficient token based clone detection with flexible tokenization (HAB, SJ), pp. 513–516.
ESEC-FSEESEC-FSE-2007-EvansS #approach #difference #testing
Differential testing: a new approach to change detection (RBE, AS), pp. 549–552.
ESEC-FSEESEC-FSE-2007-JiangSC #debugging
Context-based detection of clone-related bugs (LJ, ZS, EC), pp. 55–64.
ESEC-FSEESEC-FSE-2007-MizunoK #empirical #fault
Training on errors experiment to detect fault-prone software modules by spam filter (OM, TK), pp. 405–414.
ESEC-FSEESEC-FSE-2007-NgoT #scalability
Detecting large number of infeasible paths through recognizing their patterns (MNN, HBKT), pp. 215–224.
ESEC-FSEESEC-FSE-2007-VoungJL #concurrent #named
RELAY: static race detection on millions of lines of code (JWV, RJ, SL), pp. 205–214.
ESEC-FSEESEC-FSE-2007-WasylkowskiZL
Detecting object usage anomalies (AW, AZ, CL), pp. 35–44.
ESEC-FSEESEC-FSE-2007-YeCCX #composition
Detection and resolution of atomicity violation in service composition (CY, SCC, WKC, CX), pp. 235–244.
ICSEICSE-2007-DammL #fault #implementation #metric
Company-Wide Implementation of Metrics for Early Software Fault Detection (LOD, LL), pp. 560–570.
ICSEICSE-2007-JiangMSG #named #scalability
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones (LJ, GM, ZS, SG), pp. 96–105.
ICSEICSE-2007-RunesonAN #fault #natural language #using
Detection of Duplicate Defect Reports Using Natural Language Processing (PR, MA, ON), pp. 499–510.
SACSAC-2007-AlbertiniM #network #self
A self-organizing neural network for detecting novelties (MKA, RFdM), pp. 462–466.
SACSAC-2007-CicchettiR #modelling #specification #weaving
Weaving models in conflict detection specifications (AC, AR), pp. 1035–1036.
SACSAC-2007-FangWLYD #assessment #multi #sequence #using
The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
SACSAC-2007-KoschmiderO #how #process #question #semantics
How to detect semantic business process model variants? (AK, AO), pp. 1263–1264.
SACSAC-2007-MaHA #evaluation
Evaluation of the QoS of crash-recovery failure detection (TM, JH, SA), pp. 538–542.
SACSAC-2007-MeddebDB
Global intrusion detection and tolerance in networked systems (AM, YD, NB), pp. 188–189.
SACSAC-2007-NguyenT #kernel #towards
Towards a tamper-resistant kernel rootkit detector (AQN, YT), pp. 276–283.
SACSAC-2007-PlattGM #on the #query #sequence #topic #using
On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
SACSAC-2007-SatzgerPTU #adaptation #distributed
A new adaptive accrual failure detector for dependable distributed systems (BS, AP, WT, TU), pp. 551–555.
SACSAC-2007-SoleimaniADDBA #named #reliability
RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
SACSAC-2007-SongJMJXH #programming
Mass edge detection in mammography based on plane fitting and dynamic programming (ES, LJ, BM, RJ, XX, CCH), pp. 80–81.
SACSAC-2007-SpinosaCG #approach #clustering #concept #data type #named
OLINDDA: a cluster-based approach for detecting novelty and concept drift in data streams (EJS, ACPdLFdC, JG), pp. 448–452.
SACSAC-2007-YiKOJKD #hardware #performance
Memory-efficient content filtering hardware for high-speed intrusion detection systems (SY, BKK, JO, JJ, GK, CRD), pp. 264–269.
CASECASE-2007-AlenljungSLA #fault #implementation #process
PLC-based Implementation of Process Observation and Fault Detection for Discrete Event Systems (TA, MS, BL, ), pp. 207–212.
CASECASE-2007-FagioliniVPDB #distributed #implementation #monitoring #multi
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems (AF, GV, LP, GD, AB), pp. 454–459.
CGOCGO-2007-WangKWY #fault #multi #thread
Compiler-Managed Software-based Redundant Multi-Threading for Transient Fault Detection (CW, HSK, YW, VY), pp. 244–258.
DACDAC-2007-WuW #incremental
Improving Voltage Assignment by Outlier Detection and Incremental Placement (HW, MDFW), pp. 459–464.
DATEDATE-2007-FavalliM #fault #interactive
Interactive presentation: Pulse propagation for the detection of small delay defects (MF, CM), pp. 1295–1300.
DATEDATE-2007-HashempourL #fault #modelling
Circuit-level modeling and detection of metallic carbon nanotube defects in carbon nanotube FETs (HH, FL), pp. 841–846.
DATEDATE-2007-HsiehLB #fault #reduction
Reduction of detected acceptable faults for yield improvement via error-tolerance (TYH, KJL, MAB), pp. 1599–1604.
DATEDATE-2007-KokkelerSKK
Cyclostationary feature detection on a tiled-SoC (ABJK, GJMS, TK, JK), pp. 171–176.
HPCAHPCA-2007-MeixnerS #fault #online
Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures (AM, DJS), pp. 145–156.
HPCAHPCA-2007-ZhouTZ #concurrent #named
HARD: Hardware-Assisted Lockset-based Race Detection (PZ, RT, YZ), pp. 121–132.
HPDCHPDC-2007-LuLJ #adaptation #consistency #framework #idea #named
IDEA: : an infrastructure for detection-based adaptive consistency control in replicated services (YL, YL, HJ), pp. 223–224.
ISMMISMM-2007-NguyenR #memory management #using
Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
PDPPDP-2007-FlorioB #protocol
A Tool for the Expression of Failure Detection Protocols (VDF, CB), pp. 199–204.
PDPPDP-2007-PlazaVBP #image #network #parallel #using
Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations (AP, DV, SB, JP), pp. 333–340.
PDPPDP-2007-WielandLL #algorithm #evaluation
An evaluation of ring-based algorithms for the Eventually Perfect failure detector class (JW, ML, AL), pp. 163–170.
PPoPPPPoPP-2007-MuhlenfeldW #c++ #concurrent #fault #multi #thread
Fault detection in multi-threaded c++ server applications (AM, FW), pp. 142–143.
PPoPPPPoPP-2007-SchuffCP #network #parallel
Conservative vs. optimistic parallelization of stateful network intrusion detection (DLS, YRC, VSP), pp. 138–139.
SOSPSOSP-2007-LuPHMJLPZ #automation #concurrent #correlation #debugging #multi #named #semantics
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs (SL, SP, CH, XM, WJ, ZL, RAP, YZ), pp. 103–116.
TACASTACAS-2007-ElkindGP #sequence chart
Detecting Races in Ensembles of Message Sequence Charts (EE, BG, DP), pp. 420–434.
CAVCAV-2007-BarnatBS #performance
I/O Efficient Accepting Cycle Detection (JB, LB, PS), pp. 281–293.
CAVCAV-2007-KahlonYSG #concurrent #performance #source code
Fast and Accurate Static Data-Race Detection for Concurrent Programs (VK, YY, SS, AG), pp. 226–239.
ISSTAISSTA-2007-TombBV #fault #interprocedural #program analysis #runtime
Variably interprocedural program analysis for runtime error detection (AT, GPB, WV), pp. 97–107.
ISSTAISSTA-2007-XinZ #dependence #online #performance
Efficient online detection of dynamic control dependence (BX, XZ), pp. 185–195.
TAPTAP-2007-Gargantini #fault #model checking #testing #using
Using Model Checking to Generate Fault Detecting Tests (AG), pp. 189–206.
TAPTAP-2007-SmaragdakisC #debugging #reasoning
Combining Static and Dynamic Reasoning for Bug Detection (YS, CC), pp. 1–16.
FATESTestCom-FATES-2007-NeukirchenB #problem #quality #smell #testing
Utilising Code Smells to Detect Quality Problems in TTCN-3 Test Suites (HN, MB), pp. 228–243.
FATESTestCom-FATES-2007-UralX #approach #fault
An EFSM-Based Passive Fault Detection Approach (HU, ZX), pp. 335–350.
DocEngDocEng-2006-QeliGF #documentation #using #xml #xpath
Customizable detection of changes for XML documents using XPath expressions (EQ, JG, BF), pp. 88–90.
DRRDRR-2006-ZhuJD #documentation #framework #robust
A robust stamp detection framework on degraded documents (GZ, SJ, DSD).
SIGMODSIGMOD-2006-DengR #approximate #streaming #using
Approximately detecting duplicates for streaming data using stable bloom filters (FD, DR), pp. 25–36.
SIGMODSIGMOD-2006-XueLCL #network
Contour map matching for event detection in sensor networks (WX, QL, LC, YL), pp. 145–156.
SIGMODSIGMOD-2006-ZieglerKSDB #ontology #similarity #tool support
Generic similarity detection in ontologies with the SOQA-SimPack toolkit (PZ, CK, CS, KRD, AB), pp. 751–753.
VLDBVLDB-2006-GyongyiBGP #estimation
Link Spam Detection Based on Mass Estimation (ZG, PB, HGM, JOP), pp. 439–450.
VLDBVLDB-2006-Luo #performance #query
Efficient Detection of Empty-Result Queries (GL), pp. 1015–1025.
VLDBVLDB-2006-SubramaniamPPKG #modelling #online #parametricity #using
Online Outlier Detection in Sensor Data Using Non-Parametric Models (SS, TP, DP, VK, DG), pp. 187–198.
ITiCSEITiCSE-2006-GerdtS #automation
A web-based service for the automatic detection of roles of variables (PG, JS), pp. 178–182.
CSMRCSMR-2006-RysselbergheRD #version control
Detecting Move Operations in Versioning Information (FVR, MR, SD), pp. 271–278.
ICPCICPC-2006-SalehieLT #design #framework #heuristic #object-oriented
A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws (MS, SL, LT), pp. 159–168.
MSRMSR-2006-SagerBPK #algorithm #java #using
Detecting similar Java classes using tree algorithms (TS, AB, MP, CK), pp. 65–71.
WCREWCRE-2006-FontanaRGAS #design pattern #reverse engineering
Design Pattern Detection for Reverse Engineering (FAF, CR, YGG, GA, JMS), p. 316.
WCREWCRE-2006-KoschkeFF #clone detection #syntax #using
Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
WCREWCRE-2006-XingS #query #refactoring
Refactoring Detection based on UMLDiff Change-Facts Queries (ZX, ES), pp. 263–274.
CoGCIG-2006-MillerMC #network #using
Anomaly Detection in Magnetic Motion Capture using a 2-Layer SOM network (IM, SM, BC), pp. 236–242.
ICGTICGT-2006-LambersEO #graph transformation
Conflict Detection for Graph Transformation with Negative Application Conditions (LL, HE, FO), pp. 61–76.
ICEISICEIS-ISAS-2006-ChengX #approach #behaviour #concurrent #formal method #online
A Formal Approach to Detecting Shilling Behaviors in Concurrent Online Auctions (YTC, HX), pp. 375–381.
CIKMCIKM-2006-LiC #topic #using
Improving novelty detection for general topics using sentence level information patterns (XL, WBC), pp. 238–247.
CIKMCIKM-2006-ParthasarathyMS #algorithm #robust
Robust periodicity detection algorithms (SP, SM, SS), pp. 874–875.
CIKMCIKM-2006-ShahCJ #documentation #representation
Representing documents with named entities for story link detection (SLD) (CS, WBC, DJ), pp. 868–869.
CIKMCIKM-2006-VieiraSPMCF #performance #robust #web
A fast and robust method for web page template detection and removal (KV, ASdS, NP, ESdM, JMBC, JF), pp. 258–267.
ECIRECIR-2006-EissenS
Intrinsic Plagiarism Detection (SMzE, BS), pp. 565–569.
ECIRECIR-2006-ZhangDC
Combining Short and Long Term Audio Features for TV Sports Highlight Detection (BZ, WD, LC), pp. 472–475.
ICMLICML-2006-PandaCW #bound #concept
Concept boundary detection for speeding up SVMs (NP, EYC, GW), pp. 681–688.
ICMLICML-2006-SilvaBBE #using
Dealing with non-stationary environments using context detection (BCdS, EWB, ALCB, PME), pp. 217–224.
ICMLICML-2006-VeeramachaneniOA
Active sampling for detecting irrelevant features (SV, EO, PA), pp. 961–968.
ICPRICPR-v1-2006-Amano #correlation #fault #image
Correlation Based Image Defect Detection (TA), pp. 163–166.
ICPRICPR-v1-2006-AndradeBF #modelling
Modelling Crowd Scenes for Event Detection (ELA, SB, RBF), pp. 175–178.
ICPRICPR-v1-2006-AokiK #3d
Detection of 3D-Flow by Characteristic of Convex-concave and Color (KA, HK), pp. 75–78.
ICPRICPR-v1-2006-ArzhaevaGT #classification #distance #image
Image Classification from Generalized Image Distance Features: Application to Detection of Interstitial Disease in Chest Radiographs (YA, BvG, DMJT), pp. 367–370.
ICPRICPR-v1-2006-BauckhageK #multi #performance
Fast, Illumination Insensitive Face Detection Based on Multilinear Techniques and Curvature Features (CB, TK), pp. 507–510.
ICPRICPR-v1-2006-BenjellounTM #using
Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
ICPRICPR-v1-2006-BernardinES #adaptation #multi #robust
Detection-Assisted Initialization, Adaptation and Fusion of Body Region Trackers for Robust Multiperson Tracking (KB, AE, RS), pp. 441–445.
ICPRICPR-v1-2006-BernierB #multi
Generic Detection of Multi-Part Objects (JFB, RB), pp. 840–843.
ICPRICPR-v1-2006-ChaoTTJ #fault #using
Defect detection in low-contrast glass substrates using anisotropic diffusion (SMC, DMT, YHT, YRJ), pp. 654–657.
ICPRICPR-v1-2006-ChenCCW
Nighttime Vehicle Detection for Driver Assistance and Autonomous Vehicles (YLC, YHC, CJC, BFW), pp. 687–690.
ICPRICPR-v1-2006-ChengZS
Boosted Gabor Features Applied to Vehicle Detection (HC, NZ, CS), pp. 662–666.
ICPRICPR-v1-2006-ChowdhuryGWM #feature model
Note on Feature Selection for Polyp Detection in CT Colonography (TAC, OG, PFW, AAM), pp. 1017–1021.
ICPRICPR-v1-2006-Czyz #video
Object Detection in Video via Particle Filters (JC), pp. 820–823.
ICPRICPR-v1-2006-DijckH
Onset Detection through Maximal Redundancy Detection (GVD, MMVH), pp. 945–949.
ICPRICPR-v1-2006-DoYC #estimation #using
Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
ICPRICPR-v1-2006-GayuboGFMP #fault #online #process
On-line machine vision system for detect split defects in sheet-metal forming processes (FG, JLG, EdlFL, FMT, JRP), pp. 723–726.
ICPRICPR-v1-2006-HadidP #approach #hybrid
A Hybrid Approach to Face Detection under Unconstrained Environments (AH, MP), pp. 227–230.
ICPRICPR-v1-2006-HarasseBD #people
Human model for people detection in dynamic scenes (SH, LB, MD), pp. 335–354.
ICPRICPR-v1-2006-HuangM #independence #realtime #towards
Toward A Speaker-Independent Real-Time Affect Detection System (RH, CM), pp. 1204–1207.
ICPRICPR-v1-2006-ItoO #invariant #recognition #using
Detection and Recognition of Moving Objects by Using Motion Invariants (SI, NO), pp. 683–686.
ICPRICPR-v1-2006-KorzhovaGS #video
Detection of SpiralWaves in Video (VNK, DBG, GMS), pp. 396–399.
ICPRICPR-v1-2006-LinCW #multi #queue #realtime
A Real-Time Multiple-Vehicle Detection and Tracking System with Prior Occlusion Detection and Resolution, and Prior Queue Detection and Resolution (SPL, YHC, BFW), pp. 828–831.
ICPRICPR-v1-2006-LiuPHCB #clustering
Detecting Virulent Cells of Cryptococcus Neoformans Yeast: Clustering Experiments (JL, PvdP, FH, XC, TB), pp. 1112–1115.
ICPRICPR-v1-2006-LiuZH #symmetry
Fingerprint Reference Point Detection Based on Local Axial Symmetry (TL, CZ, PH), pp. 1050–1053.
ICPRICPR-v1-2006-LoY #multi
Shadow Detection by Integrating Multiple Features (KHL, MTY), pp. 743–746.
ICPRICPR-v1-2006-OgataCKI #multi #process
Improving human activity detection by combining multi-dimensional motion descriptors with boosting (TO, WJC, JK, SI), pp. 295–298.
ICPRICPR-v1-2006-ParkAB #metric #performance
Efficient Measurement of Eye Blinking under Various Illumination Conditions for Drowsiness Detection Systems (IP, JHA, HB), pp. 383–386.
ICPRICPR-v1-2006-PongC #3d #modelling #using
Optimal Cascade Construction for Detection using 3D Models (HKP, TJC), pp. 808–811.
ICPRICPR-v1-2006-TakeshimaIK #self #using
Object Contour Detection Using Spatio-temporal Self-sim (HT, TI, TK), pp. 613–617.
ICPRICPR-v1-2006-TavakkoliNB #learning #recursion #robust
Robust Recursive Learning for Foreground Region Detection in Videos with Quasi-Stationary Backgrounds (AT, MN, GB), pp. 315–318.
ICPRICPR-v1-2006-ToewsA #invariant
Detection Over Viewpoint via the Object Class Invariant (MT, TA), pp. 765–768.
ICPRICPR-v1-2006-TrujilloO #evolution #how #using
Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
ICPRICPR-v1-2006-WangS06a #component #constraints #geometry
Facial Components Detection with Boosting and Geometric Constraints (TW, PS), pp. 446–449.
ICPRICPR-v1-2006-WenGL #clustering #markov #monte carlo
Markov Chain Monte Carlo Data Association for Merge and Split Detection in Tracking Protein Clusters (QW, JG, KLP), pp. 1030–1033.
ICPRICPR-v1-2006-XingmingH #algorithm #independence
An Illumination Independent Eye Detection Algorithm (XZ, HZ), pp. 392–395.
ICPRICPR-v1-2006-XuSL #adaptation #behaviour #monitoring
Tree Based Behavior Monitoring for Adaptive Fraud Detection (JX, AHS, QL), pp. 1208–1211.
ICPRICPR-v1-2006-YuA #video
Detection of Fence Climbing from Monocular Video (EY, JKA), pp. 375–378.
ICPRICPR-v1-2006-ZehnderKG #multi #performance
Efficient, Simultaneous Detection of Multiple Object Classes (PZ, EKM, LJVG), pp. 797–802.
ICPRICPR-v1-2006-ZhangFX #image #orthogonal #using
Detection of moving cast shadows using image orthogonal transform (WZ, XF, YX), pp. 626–629.
ICPRICPR-v1-2006-ZhuJ #invariant #realtime #robust
Robust Pose Invariant Facial Feature Detection and Tracking in Real-Time (ZZ, QJ), pp. 1092–1095.
ICPRICPR-v2-2006-BhuiyanN #classification #image #using
Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
ICPRICPR-v2-2006-ChenSYCG
Modification of the AdaBoost-based Detector for Partially Occluded Faces (JC, SS, SY, XC, WG), pp. 516–519.
ICPRICPR-v2-2006-CorneliusL #symmetry
Detecting Rotational Symmetry Under Affine Projection (HC, GL), pp. 292–295.
ICPRICPR-v2-2006-DhandraMHH #approach #documentation #image
Skew Detection in Binary Image Documents Based on Image Dilation and Region labeling Approach (BVD, VSM, MH, RH), pp. 954–957.
ICPRICPR-v2-2006-FangC #robust #statistics #using
Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection (WF, KLC), pp. 304–307.
ICPRICPR-v2-2006-FuHC
Vision-Based Preceding Vehicle Detection and Tracking (CMF, CLH, YSC), pp. 1070–1073.
ICPRICPR-v2-2006-GanLY #analysis
Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
ICPRICPR-v2-2006-GranaCPS #network
Line Detection and Texture Characterization of Network Patterns (CG, RC, GP, SS), pp. 275–278.
ICPRICPR-v2-2006-GuptaD #multi #using
Texture Edge Detection using Multi-resolution Features and SOM (LG, SD), pp. 199–202.
ICPRICPR-v2-2006-HorvathJZK #higher-order
A Higher-Order Active Contour Model for Tree Detection (PH, IJ, JZ, ZK), pp. 130–133.
ICPRICPR-v2-2006-Kita #using
Change detection using joint intensity histogram (YK), pp. 351–356.
ICPRICPR-v2-2006-LeS #named #robust #using
Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection (DDL, SS), pp. 602–605.
ICPRICPR-v2-2006-LiLWH #framework #image #novel #using
A Novel Framework for Urban Change Detection Using VHR Satellite Images (WL, XL, YW, ZH), pp. 312–315.
ICPRICPR-v2-2006-LiZD #documentation
Detecting Text Lines in Handwritten Documents (YL, YZ, DSD), pp. 1030–1033.
ICPRICPR-v2-2006-MekuzDT #adaptation
Adaptive Step Size Window Matching for Detection (NM, KGD, JKT), pp. 259–262.
ICPRICPR-v2-2006-RamalhoM #image #using
Using Boosting to Improve Oil Spill Detection in SAR Images (GLBR, FNSdM), pp. 1066–1069.
ICPRICPR-v2-2006-SantoFSPV #algorithm
An Unsupervised Algorithm for Anchor Shot Detection (MDS, PF, CS, GP, MV), pp. 1238–1241.
ICPRICPR-v2-2006-SunV #linear #multi #performance #using
Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
ICPRICPR-v2-2006-TarelB #kernel #parametricity
Object Predetection Based on Kernel Parametric Distribution Fitting (JPT, SB), pp. 808–811.
ICPRICPR-v2-2006-TsaiTCY #analysis #component #design #fault #image #independence
Independent component analysis based filter design for defect detection in low-contrast textured images (DMT, YHT, SMC, CHY), pp. 231–234.
ICPRICPR-v2-2006-Wang #component #performance #recognition
Efficient Facial Component Extraction for Detection and Recognition (JWW), pp. 1208–1211.
ICPRICPR-v2-2006-YangS #random #using
Detecting Coarticulation in Sign Language using Conditional Random Fields (RY, SS), pp. 108–112.
ICPRICPR-v2-2006-YuCMW #markov #monte carlo #multi
Boosted Markov Chain Monte Carlo Data Association for Multiple Target Detection and Tracking (QY, IC, GGM, BW), pp. 675–678.
ICPRICPR-v2-2006-ZhangJHW #using
Learning-Based License Plate Detection Using Global and Local Features (HZ, WJ, XH, QW), pp. 1102–1105.
ICPRICPR-v2-2006-ZhangZ
Driver Fatigue Detection Based Intelligent Vehicle Control (ZZ, JZ), pp. 1262–1265.
ICPRICPR-v3-2006-BeveridgeSR #classification #comparison #naive bayes #using
A Comparison of Pixel, Edge andWavelet Features for Face Detection using a Semi-Naive Bayesian Classifier (JRB, JS, BR), pp. 1175–1178.
ICPRICPR-v3-2006-ChenHWJF #network
The Application of a Convolution Neural Network on Face and License Plate Detection (YNC, CCH, CTW, BSJ, KCF), pp. 552–555.
ICPRICPR-v3-2006-ChiuLWCC #approach #video
A Time Warping Based Approach for Video Copy Detection (CYC, CHL, HAW, CSC, LFC), pp. 228–231.
ICPRICPR-v3-2006-El-BazFRYEE #analysis #image
Image Analysis of Renal DCE MRI for the Detection of Acute Renal Rejection (AEB, AAF, RF, SEY, MAEG, TE), pp. 822–825.
ICPRICPR-v3-2006-FujitaMH
A Method for Crack Detection on a Concrete Structure (YF, YM, YH), pp. 901–904.
ICPRICPR-v3-2006-KawabataHS #realtime
Real-Time Detection of Anomalous Objects in Dynamic Scene (SK, SH, KS), pp. 1171–1174.
ICPRICPR-v3-2006-Law-ToGBB #behaviour #video
Local Behaviours Labelling for Content Based Video Copy Detection (JLT, VGB, OB, NB), pp. 232–235.
ICPRICPR-v3-2006-LeeP #classification #robust
Robust vehicle detection based on shadow classification (DL, YP), pp. 1167–1170.
ICPRICPR-v3-2006-PeiLX #information retrieval
A Method For IR Point Target Detection Based on Spatial-temporal Bilateral Filter (JP, ZL, WX), pp. 846–849.
ICPRICPR-v3-2006-PlotzFHKLMMSSS #automation #modelling #music #probability #using
Automatic Detection of Song Changes in Music Mixes Using Stochastic Models (TP, GAF, PH, SK, KL, TM, MM, LS, MS, HS), pp. 665–668.
ICPRICPR-v3-2006-SakaiA #metric #using
Human and Object Detection in Smoke-filled Space using Millimeter-wave radar based Measurement System (MS, YA), p. 750.
ICPRICPR-v3-2006-SalmonDW
A new method to detect arcs and segments from curvature profiles (JPS, IDR, LW), pp. 387–390.
ICPRICPR-v3-2006-VandeportaeleCM #image #performance
A Fast Detector of Line Images Acquired by an Uncalibrated Paracatadioptric Camera (BV, MC, PM), pp. 1042–1045.
ICPRICPR-v3-2006-VartiainenSLKK
Detecting irregularities in regular patterns (JV, AS, LL, JKK, HK), pp. 926–929.
ICPRICPR-v3-2006-WangCSG #set
Enhancing Training Set for Face Detection (RW, JC, SS, WG), pp. 477–480.
ICPRICPR-v3-2006-WillamowskiC #automation #probability
Probabilistic Automatic Red Eye Detection and Correction (JW, GC), pp. 762–765.
ICPRICPR-v3-2006-YangB #generative
A Combination of Generative and Discriminative Approaches to Object Detection (JY, HB), pp. 249–253.
ICPRICPR-v3-2006-YoshimuraIY #adaptation #correlation
Object Detection with Adaptive Background Model and Margined Sign Cross Correlation (HY, YI, MY), pp. 19–23.
ICPRICPR-v3-2006-ZhangDC #analysis #game studies
Ball Hit Detection in Table Tennis Games Based on Audio Analysis (BZ, WD, LC), pp. 220–223.
ICPRICPR-v3-2006-ZhongW #markov #random
Object Detection Based on Combination of Conditional Random Field and Markov Random Field (PZ, RW), pp. 160–163.
ICPRICPR-v3-2006-ZhouK #mining #multi #video
Unusual Event Detection via Multi-camera Video Mining (HZ, DK), pp. 1161–1166.
ICPRICPR-v4-2006-AuSC #video
Anomaly Detection for Video Surveillance Applications (CEA, SS, JJC), pp. 888–891.
ICPRICPR-v4-2006-ChenJY06a #distributed #fault
Fault Detection in Distributed Systems by Representative Subspace Mapping (HC, GJ, KY), pp. 912–915.
ICPRICPR-v4-2006-HerzogNKMOB #image
Detection of presynaptic terminals on dendritic spines in double labeling confocal images (AH, RN, GK, BM, WO, KB), pp. 715–718.
ICPRICPR-v4-2006-JinYSLX #classification #hybrid #precise #robust
A hybrid classifier for precise and robust eye detection (LJ, XHY, SS, JL, LX), pp. 731–735.
ICPRICPR-v4-2006-Jun #comparison #dataset
A Peer Dataset Comparison Outlier Detection Model Applied to Financial Surveillance (TJ), pp. 900–903.
ICPRICPR-v4-2006-KryszczukD #using
Singular point detection in fingerprints using quadrant change information (KK, AD), pp. 594–597.
ICPRICPR-v4-2006-LuoHQ #image #robust
Robust Detection of Region-Duplication Forgery in Digital Image (WL, JH, GQ), pp. 746–749.
ICPRICPR-v4-2006-MacenkoCM #segmentation #using
Lesion Detection Using Morphological Watershed Segmentation and Modelbased Inverse Filtering (MM, MC, LM), pp. 679–682.
ICPRICPR-v4-2006-Onoguchi #correlation #using
Moving Object Detection Using a Cross Correlation between a Short Accumulated Histogram and a Long Accumulated Histogram (KO), pp. 896–899.
ICPRICPR-v4-2006-RohL #gesture #video
Gesture Detection in Low-Quality Video (MCR, SWL), pp. 791–794.
ICPRICPR-v4-2006-SatoTIM #coordination #image #sequence
Change detection in streetscapes from GPS coordinated omni-directional image sequences (JS, TT, II, HM), pp. 935–938.
ICPRICPR-v4-2006-VilarinoSPVR #automation #video
Automatic Detection of Intestinal Juices in Wireless Capsule Video Endoscopy (FV, PS, OP, JV, PR), pp. 719–722.
ICPRICPR-v4-2006-VillamizarSA #image #invariant #realtime #using
Computation of Rotation Local Invariant Features using the Integral Image for Real Time Object Detection (MV, AS, JAC), pp. 81–85.
ICPRICPR-v4-2006-WangC #using #video
Detecting Video Texts Using Spatial-Temporal Wavelet Transform (YKW, JMC), pp. 754–757.
ICPRICPR-v4-2006-WangLTX #estimation #multi #realtime #video
Real-Time Multi-View Face Detection and Pose Estimation in Video Stream (YW, YL, LT, GX), pp. 354–357.
ICPRICPR-v4-2006-YamaguchiKN #estimation #using
Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera (KY, TK, YN), pp. 610–613.
ICPRICPR-v4-2006-YangLPZZ #learning
Active Learning Based Pedestrian Detection in Real Scenes (TY, JL, QP, CZ, YZ), pp. 904–907.
ICPRICPR-v4-2006-ZhangFY
Moving cast shadows detection based on ratio edge (WZ, XF, XY), pp. 73–76.
ICPRICPR-v4-2006-ZhaoG #robust
Robust Eye Detection under Active Infrared Illumination (SZ, RRG), pp. 481–484.
KDDKDD-2006-AbeZL #learning
Outlier detection by active learning (NA, BZ, JL), pp. 504–509.
KDDKDD-2006-AbeZL06a
Outlier detection by sampling with accuracy guarantees (MW, CJ), pp. 767–772.
KDDKDD-2006-BarbaraDR #statistics #testing #using
Detecting outliers using transduction and statistical testing (DB, CD, JPR), pp. 55–64.
KDDKDD-2006-BiPOKFSR #classification #symmetry
Computer aided detection via asymmetric cascade of sparse hyperplane classifiers (JB, SP, KO, TK, GF, MS, RBR), pp. 837–844.
KDDKDD-2006-BurkeMWB #classification #collaboration #recommendation
Classification features for attack detection in collaborative recommender systems (RDB, BM, CW, RB), pp. 542–547.
KDDKDD-2006-CastanoMTGDCCD #classification
Onboard classifiers for science event detection on a remote sensing spacecraft (RC, DM, NT, RG, TD, BC, SAC, AD), pp. 845–851.
KDDKDD-2006-IhlerHS #adaptation #process
Adaptive event detection with time-varying poisson processes (ATI, JH, PS), pp. 207–216.
KDDKDD-2006-LiuCHY #analysis #dependence #graph #named
GPLAG: detection of software plagiarism by program dependence graph analysis (CL, CC, JH, PSY), pp. 872–881.
KDDKDD-2006-VirdhagriswaranD
Camouflaged fraud detection in domains with complex relationships (SV, GD), pp. 941–947.
KDDKDD-2006-ZhangCFM #recommendation
Attack detection in time series for recommender systems (SZ, AC, JF, FM), pp. 809–814.
KDDKDD-2006-ZhaoLBM #evolution
Event detection from evolution of click-through data (QZ, TYL, SSB, WYM), pp. 484–493.
KDDKDD-2006-ZhuNWZM #web
Simultaneous record detection and attribute labeling in web data extraction (JZ, ZN, JRW, BZ, WYM), pp. 494–503.
SEKESEKE-2006-ShinX #component #self
Enhanced Anomaly Detection in Self-Healing Components (MES, YX), pp. 485–488.
SEKESEKE-2006-SornilS #using
Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
SIGIRSIGIR-2006-OtterbacherR
Fact-focused novelty detection: a feasibility study (JO, DRR), pp. 687–688.
SIGIRSIGIR-2006-ShenYSC #concurrent #thread
Thread detection in dynamic text message streams (DS, QY, JTS, ZC), pp. 35–42.
SIGIRSIGIR-2006-YangC #clustering
Near-duplicate detection by instance-level constrained clustering (HY, JPC), pp. 421–428.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
ECOOPECOOP-2006-DigCMJ #automation #component #evolution #refactoring
Automated Detection of Refactorings in Evolving Components (DD, CC, DM, REJ), pp. 404–428.
AdaEuropeAdaEurope-2006-BurgstallerBM #ada #static analysis
Static Detection of Access Anomalies in Ada95 (BB, JB, RM), pp. 40–55.
AdaEuropeAdaEurope-2006-Cheng #ada #realtime #runtime
Run-Time Detection of Tasking Deadlocks in Real-Time Systems with the Ada 95 Annex of Real-Time Systems (JC), pp. 167–178.
LOPSTRLOPSTR-2006-Payet #term rewriting #using
Detecting Non-termination of Term Rewriting Systems Using an Unfolding Operator (ÉP), pp. 194–209.
PLDIPLDI-2006-NaikAW #concurrent #effectiveness #java
Effective static race detection for Java (MN, AA, JW), pp. 308–319.
PLDIPLDI-2006-PratikakisFH #analysis #concurrent #correlation #named
LOCKSMITH: context-sensitive correlation analysis for race detection (PP, JSF, MWH), pp. 320–331.
RERE-2006-Cleland-HuangSZS #aspect-oriented #classification #non-functional #requirements
The Detection and Classification of Non-Functional Requirements with Application to Early Aspects (JCH, RS, XZ, PS), pp. 36–45.
RERE-2006-GiorginiMMZ
Detecting Conflicts of Interest (PG, FM, JM, NZ), pp. 308–311.
ASEASE-2006-MohaGL #algorithm #automation #design #fault #generative
Automatic Generation of Detection Algorithms for Design Defects (NM, YGG, PL), pp. 297–300.
ASEASE-2006-RamanathanGJ #automation #named
Sieve: A Tool for Automatically Detecting Variations Across Program Versions (MKR, AG, SJ), pp. 241–252.
ASEASE-2006-StorzerF
Detecting Precedence-Related Advice Interference (MS, FF), pp. 317–322.
FSEFSE-2006-DwyerPE #fault
Controlling factors in evaluating path-sensitive error detection techniques (MBD, SP, SGE), pp. 92–104.
FSEFSE-2006-GirouxR #testing #using
Detecting increases in feature coupling using regression tests (OG, MPR), pp. 163–174.
ICSEICSE-2006-HeineL #polymorphism #static analysis
Static detection of leaks in polymorphic containers (DLH, MSL), pp. 252–261.
ICSEICSE-2006-MoriISI #mobile
A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
ICSEICSE-2006-NakamichiSSM #behaviour #usability #using #web
Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
SACSAC-2006-ChenJH #fault #generative #multi #sequence #testing
A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences (KC, FJ, CdH), pp. 1791–1797.
SACSAC-2006-ChenJUY #distributed #fault #monitoring
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems (HC, GJ, CU, KY), pp. 705–709.
SACSAC-2006-ChenYL #scalability
Template detection for large scale search engines (LC, SY, XL), pp. 1094–1098.
SACSAC-2006-GaoCT
Semi-supervised outlier detection (JG, HC, PNT), pp. 635–636.
SACSAC-2006-MandalCDC #documentation #image #segmentation
Detection and segmentation of tables and math-zones from document images (SM, SPC, AKD, BC), pp. 841–846.
SACSAC-2006-Roth #mobile
Detecting identifiable areas in mobile environments (JR), pp. 986–991.
ASPLOSASPLOS-2006-BondM #encoding #memory management #named #online
Bell: bit-encoding online memory leak detection (MDB, KSM), pp. 61–72.
ASPLOSASPLOS-2006-ChilimbiG #debugging #identification #named #using
HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
ASPLOSASPLOS-2006-CrandallWOSWC #virtual machine
Temporal search: detecting hidden malware timebombs with virtual machines (JRC, GW, DASdO, ZS, SFW, FTC), pp. 25–36.
ASPLOSASPLOS-2006-LuTQZ #invariant #named
AVIO: detecting atomicity violations via access interleaving invariants (SL, JT, FQ, YZ), pp. 37–48.
CASECASE-2006-HuCLY #algorithm #robust #statistics
A Robust Statistical-based Speaker’s Location Detection Algorithm in a Vehicular Environment (JSH, CCC, WHL, CHY), pp. 274–279.
CASECASE-2006-LuHLL #image
Detecting Small Target of Ship at Sea by Infrared Image (JWL, YJH, HYL, FLL), pp. 165–169.
CASECASE-2006-QiuMH #design
The Design of Field Information Detection System Based on Microcomputer (ZQ, JM, YH), pp. 156–160.
CASECASE-2006-Shi0
Signal Detecting Based on Instantaneous Virtual Power (WS, JL), pp. 270–273.
CASECASE-2006-XuWZZ #algorithm #automation #using
An Automatic EEG Spike Detection Algorithm Using Morphological Filter (GX, JW, QZ, JZ), pp. 170–175.
CGOCGO-2006-BorinWWA #control flow #fault
Software-Based Transparent and Comprehensive Control-Flow Error Detection (EB, CW, YW, GA), pp. 333–345.
CGOCGO-2006-DasLH #monitoring #optimisation
Region Monitoring for Local Phase Detection in Dynamic Optimization Systems (AD, JL, WCH), pp. 124–134.
CGOCGO-2006-KimSMP #2d #branch #named #set
2D-Profiling: Detecting Input-Dependent Branches with a Single Input Data Set (HK, MAS, OM, YNP), pp. 159–172.
CGOCGO-2006-NagpurkarKHSR #algorithm #online
Online Phase Detection Algorithms (PN, CK, MH, PFS, VTR), pp. 111–123.
DACDAC-2006-NelsonBDB #multi #physics
Multiple-detect ATPG based on physical neighborhoods (JEN, JGB, RD, RD(B), pp. 1099–1102.
DACDAC-2006-SuhendraMRC #analysis #performance
Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
DACDAC-2006-VrankenGGSH #fault
Fault detection and diagnosis with parity trees for space compaction of test responses (HPEV, SKG, AG, JS, FH), pp. 1095–1098.
DACDAC-2006-Wang #symmetry
Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Detection (KHW), pp. 516–521.
DACDAC-2006-ZhangMBC #representation #satisfiability #scalability #simulation #symmetry #using
Symmetry detection for large Boolean functions using circuit representation, simulation, and satisfiability (JSZ, AM, RKB, MCJ), pp. 510–515.
DATEDATE-2006-AbbasIA
On-chip 8GHz non-periodic high-swing noise detector (MA, MI, KA), pp. 670–671.
DATEDATE-2006-AlmukhaizimM #concurrent #fault
Berger code-based concurrent error detection in asynchronous burst-mode machines (SA, YM), pp. 71–72.
DATEDATE-2006-ChaiK #symmetry
Building a better Boolean matcher and symmetry detector (DC, AK), pp. 1079–1084.
DATEDATE-2006-KrautzP0TWV #fault #formal method #logic #using
Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
DATEDATE-2006-KrusemanH #fault #on the
On test conditions for the detection of open defects (BK, MH), pp. 896–901.
DATEDATE-2006-OmanaCRM #fault #low cost #reliability
Low-cost and highly reliable detector for transient and crosstalk faults affecting FPGA interconnects (MO, JMC, DR, CM), pp. 170–175.
DATEDATE-2006-PomeranzR #fault #generative #testing
Generation of broadside transition fault test sets that detect four-way bridging faults (IP, SMR), pp. 907–912.
DATEDATE-2006-SutharD #fault #multi #online #performance #testing
Efficient on-line interconnect testing in FPGAs with provable detectability for multiple faults (VS, SD), pp. 1165–1170.
DATEDATE-DF-2006-RaabeHAZ #prototype
Space-efficient FPGA-accelerated collision detection for virtual prototyping (AR, SH, JKA, GZ), pp. 206–211.
HPCAHPCA-2006-KumarA #concurrent #fault #performance
Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors (SK, AA), pp. 212–221.
HPCAHPCA-2006-Prvulovic #concurrent #effectiveness #named
CORD: cost-effective (and nearly overhead-free) order-recording and data race detection (MP), pp. 232–243.
HPDCHPDC-2006-DuanPF #data mining #fault #grid #predict
Data Mining-based Fault Prediction and Detection on the Grid (RD, RP, TF), pp. 305–308.
PDPPDP-2006-HashemzadehFH #distributed
Optimal Detection and Resolution of Distributed Deadlocks in the Generalized Model (MH, NF, ATH), pp. 133–136.
PPoPPPPoPP-2006-WangS #concurrent #fault #performance #runtime #source code
Accurate and efficient runtime detection of atomicity errors in concurrent programs (LW, SDS), pp. 137–146.
FASEFASE-2006-FeiLLM #debugging #named #online #statistics
Argus: Online Statistical Bug Detection (LF, KL, FL, SPM), pp. 308–323.
AMOSTA-MOST-J-2005-Paradkar06 #case study #effectiveness #fault #generative #modelling #testing
A quest for appropriate software fault models: Case studies on fault detection effectiveness of model-based test generation techniques (AMP), pp. 949–959.
CAVCAV-2006-TzorefG #automation #evaluation #refinement
Automatic Refinement and Vacuity Detection for Symbolic Trajectory Evaluation (RT, OG), pp. 190–204.
ICLPICLP-2006-KingLG #prolog #source code
Detecting Determinacy in Prolog Programs (AK, LL, SG), pp. 132–147.
ISSTAISSTA-2006-Wagner #analysis #quality
A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
ICTSSTestCom-2006-ChenU #distributed #problem #testing
Detecting Observability Problems in Distributed Testing (JC, HU), pp. 213–226.
VMCAIVMCAI-2006-RossignoliS #compilation
Detecting Non-cyclicity by Abstract Compilation into Boolean Functions (SR, FS), pp. 95–110.
DocEngDocEng-2005-AvilaL #algorithm #documentation #image #performance
A fast orientation and skew detection algorithm for monochromatic document images (BTÁ, RDL), pp. 118–126.
TPDLECDL-2005-KhanMZ #library #similarity
Similarity and Duplicate Detection System for an OAI Compliant Federated Digital Library (HMK, KM, MZ), pp. 531–532.
TPDLECDL-2005-NanbaO #automation #overview
Automatic Detection of Survey Articles (HN, MO), pp. 391–401.
HTHT-2005-BlusteinFS #visualisation
Information visualization for an intrusion detection system (JB, CLF, DLS), pp. 278–279.
ICDARICDAR-2005-AminW #documentation #robust
Robust Skew Detection in mixed Text/Graphics Documents (AA, SW), pp. 247–251.
ICDARICDAR-2005-BargeronVS #learning
Boosting-based Transductive Learning for Text Detection (DB, PAV, PYS), pp. 1166–1171.
ICDARICDAR-2005-EzakiKMBS
Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons (NE, KK, BTM, MB, LS), pp. 257–261.
ICDARICDAR-2005-LefevreV #locality #multi #sequence #video
Caption Localisation in Video Sequences by Fusion of Multiple Detectors (SL, NV), pp. 106–110.
ICDARICDAR-2005-LiuGI #algorithm #image #robust
A Robust Algorithm for Text Detection in Color Images (YL, SG, TI), pp. 399–405.
ICDARICDAR-2005-LiuWD #classification #image
Text Detection in Images Based on Unsupervised Classification of Edge-based Features (CL, CW, RD), pp. 610–614.
ICDARICDAR-2005-LongDC #documentation
A Model for Detecting and Merging Vertically Spanned Table Cells in Plain Text Documents (VL, RD, SC), pp. 1242–1246.
ICDARICDAR-2005-SaoiGK #clustering #image #multi
Text Detection in Color Scene Images based on Unsupervised Clustering of Multi-channel Wavelet Features (TS, HG, HK), pp. 690–694.
ICDARICDAR-2005-WenyinHXDM
Phishing Webpage Detection (LW, GH, LX, XD, ZM), pp. 560–564.
ICDARICDAR-2005-WillemsRV #online #recognition
Mode detection in on-line pen drawing and handwriting recognition (DW, SR, LV), pp. 31–35.
ICDARICDAR-2005-YingsaereeK #analysis #documentation #layout #rule-based
Rule-based Middle-level Character Detection for Simplifying Thai Document Layout Analysis (CY, AK), pp. 888–892.
JCDLJCDL-2005-KanP #online #query
Detecting and supporting known item queries in online public access catalogs (MYK, DCCP), pp. 91–99.
VLDBVLDB-2005-AbadiML #named #network #performance #robust
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks (DJA, SM, WL), pp. 769–780.
VLDBVLDB-2005-AliABEHKM #data type #framework #named
NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems (MHA, WGA, RB, AKE, AH, IK, MFM), pp. 1295–1298.
VLDBVLDB-2005-FungYYL #parametricity
Parameter Free Bursty Events Detection in Text Streams (GPCF, JXY, PSY, HL), pp. 181–192.
VLDBVLDB-2005-MetwallyAA #network #using #web
Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
CSMRCSMR-2005-MihanceaM #automation #design #object-oriented #optimisation #towards
Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems (PFM, RM), pp. 92–101.
CSMRCSMR-2005-RiccaT #case study #overview #web
Anomaly Detection in Web Applications: A Review of Already Conducted Case Studies (FR, PT), pp. 385–394.
IWPCIWPC-2005-GorgW #refactoring #visualisation
Detecting and Visualizing Refactorings from Software Archives (CG, PW), pp. 205–214.
IWPCIWPC-2005-WenT #clustering
Software Clustering based on Omnipresent Object Detection (ZW, VT), pp. 269–278.
MSRMSR-2005-GorgW #fault #re-engineering #refactoring
Error detection by refactoring reconstruction (CG, PW), pp. 86–90.
WCREWCRE-2005-KimPW #automation
When Functions Change Their Names: Automatic Detection of Origin Relationships (SK, KP, EJWJ), pp. 143–152.
WCREWCRE-2005-WangT #design pattern #eiffel
Design Pattern Detection in Eiffel Systems (WW, VT), pp. 165–174.
FMFM-2005-DonaldsonM #automation #model checking #symmetry #using
Automatic Symmetry Detection for Model Checking Using Computational Group Theory (AFD, AM), pp. 481–496.
SEFMSEFM-2005-JhumkaH
Putting Detectors in Their Place (AJ, MH), pp. 33–43.
ICEISICEIS-v1-2005-Chao #maintenance #web #xml
Change Detection and Maintenance of an XML Web Warehouse (CMC), pp. 52–59.
ICEISICEIS-v2-2005-Diaz-GomezH #algorithm #search-based #using
Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
ICEISICEIS-v2-2005-ZengG #integration
Agent-Based Intrusion Detection System for Integration (JZ, DG), pp. 176–181.
ICEISICEIS-v3-2005-CechichP #case study #functional #off the shelf
Early Detection of Cots Functional Suitability for an E-Payment Case Study (AC, MP), pp. 11–28.
ICEISICEIS-v3-2005-EspositoMORS #data mining #mining #novel #realtime
Real Time Detection of Novel Attacks by Means of Data Mining Techniques (ME, CM, FO, SPR, CS), pp. 120–127.
ICEISICEIS-v3-2005-SilvaC #non-functional #requirements
Functional and Non-Functional Application Software Requirements: Early Conflict Detection (PSMS, LC), pp. 343–348.
ICEISICEIS-v4-2005-YiZZ #ad hoc #architecture #mobile #network #using
An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
CIKMCIKM-2005-ChiritaDN #named #ranking #using
MailRank: using ranking for spam detection (PAC, JD, WN), pp. 373–380.
CIKMCIKM-2005-GoharianM #information management #on the #topic
On off-topic access detection in information systems (NG, LM), pp. 353–354.
CIKMCIKM-2005-LeonardiB #approach #database #documentation #relational #using #xml
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach (EL, SSB), pp. 509–516.
CIKMCIKM-2005-LiC05a
Novelty detection based on sentence level patterns (XL, WBC), pp. 744–751.
ECIRECIR-2005-DingCZ #analysis #clustering #concept #video
Temporal Shot Clustering Analysis for Video Concept Detection (DD, LC, BZ), pp. 558–560.
ICMLICML-2005-Ho #concept #data type #framework
A martingale framework for concept change detection in time-varying data streams (SSH), pp. 321–327.
ICMLICML-2005-WuMR #classification #linear #symmetry
Linear Asymmetric Classifier for cascade detectors (JW, MDM, JMR), pp. 988–995.
KDDKDD-2005-ChenCC #adaptation #named
LIPED: HMM-based life profiles for adaptive event detection (CCC, MCC, MSC), pp. 556–561.
KDDKDD-2005-ChenJUY #component #locality #online
Failure detection and localization in component based systems by online tracking (HC, GJ, CU, KY), pp. 750–755.
KDDKDD-2005-FujimakiYM #approach #kernel #problem #using
An approach to spacecraft anomaly detection problem using kernel feature space (RF, TY, KM), pp. 401–410.
KDDKDD-2005-LazarevicK
Feature bagging for outlier detection (AL, VK), pp. 157–166.
KDDKDD-2005-LiRGMAEGATJ #automation
Automated detection of frontal systems from numerical model-generated data (XL, RR, SJG, SM, BA, DE, SG, RA, JT, JCJ), pp. 782–787.
KDDKDD-2005-NeillMSD #clustering
Detection of emerging space-time clusters (DBN, AWM, MS, KD), pp. 218–227.
KDDKDD-2005-NorenOB #database #safety
A hit-miss model for duplicate detection in the WHO drug safety database (GNN, RO, AB), pp. 459–468.
MLDMMLDM-2005-GiacintoPR #clustering #network
Alarm Clustering for Intrusion Detection Systems in Computer Networks (GG, RP, FR), pp. 184–193.
MLDMMLDM-2005-LateckiMP #process
Activity and Motion Detection Based on Measuring Texture Change (LJL, RM, DP), pp. 476–486.
MLDMMLDM-2005-OhnishiI #analysis #component #independence #using
Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
MLDMMLDM-2005-Sy #approach
Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
SEKESEKE-2005-Chiou
Knowledge Fusion Based Object Detection In Pulmonary Radiology (YSC), pp. 37–42.
SEKESEKE-2005-VoP #concurrent #java
A Deadlock Detector for Synchronous Java (DDV, CP), pp. 537–542.
SIGIRSIGIR-2005-BennettC #email
Detecting action-items in e-mail (PNB, JGC), pp. 585–586.
SIGIRSIGIR-2005-FetterlyMN #web
Detecting phrase-level duplication on the world wide web (DF, MM, MN), pp. 170–177.
SIGIRSIGIR-2005-KuLWC #summary #topic
Major topic detection and its application to opinion summarization (LWK, LYL, THW, HHC), pp. 627–628.
SIGIRSIGIR-2005-LiWLM #probability
A probabilistic model for retrospective news event detection (ZL, BW, ML, WYM), pp. 106–113.
SIGIRSIGIR-2005-RennieJ #using
Using term informativeness for named entity detection (JDMR, TSJ), pp. 353–360.
SIGIRSIGIR-2005-TrieschniggK #approach #scalability #topic
Scalable hierarchical topic detection: exploring a sample based approach (DT, WK), pp. 655–656.
SIGIRSIGIR-2005-WangWXFLML #query
Detecting dominant locations from search queries (LW, CW, XX, JF, YL, WYM, YL), pp. 424–431.
SIGIRSIGIR-2005-Yom-TovFCD #distributed #information retrieval #learning #query
Learning to estimate query difficulty: including applications to missing content detection and distributed information retrieval (EYT, SF, DC, AD), pp. 512–519.
ECOOPECOOP-2005-PistoiaFKS #analysis #interprocedural
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
ECOOPECOOP-2005-WilliamsTE #concurrent #java #library
Static Deadlock Detection for Java Libraries (AW, WT, MDE), pp. 602–629.
PLDIPLDI-2005-ElmasTQ #concurrent #named #runtime #source code #verification
VYRD: verifYing concurrent programs by runtime refinement-violation detection (TE, ST, SQ), pp. 27–37.
PLDIPLDI-2005-XuBH #source code
A serializability violation detector for shared-memory server programs (MX, RB, MDH), pp. 1–14.
POPLPOPL-2005-XieA #fault #satisfiability #scalability #using
Scalable error detection using boolean satisfiability (YX, AA), pp. 351–363.
ASEASE-2005-AgarwalSWS #concurrent #runtime #using
Optimized run-time race detection and atomicity checking using partial discovered types (RA, AS, LW, SDS), pp. 233–242.
ASEASE-2005-KashyapG #performance #reachability
Exploiting predicate structure for efficient reachability detection (SK, VKG), pp. 4–13.
ASEASE-2005-Kemmerer #design #implementation #product line
Designing and implementing a family of intrusion detection systems (RAK), p. 3.
ASEASE-2005-SprenkleGSP #automation #web
Automated replay and failure detection for web applications (SS, EG, SS, LLP), pp. 253–262.
ESEC-FSEESEC-FSE-2005-BakerBJKTMB #diagrams #semantics #sequence chart #uml
Detecting and resolving semantic pathologies in UML sequence diagrams (PB, PB, CJ, DJK, RT, BM, SB), pp. 50–59.
ESEC-FSEESEC-FSE-2005-BasitJ #similarity #source code
Detecting higher-level similarity patterns in programs (HAB, SJ), pp. 156–165.
ESEC-FSEESEC-FSE-2005-LiZ #automation #named #programming #scalability
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code (ZL, YZ), pp. 306–315.
ESEC-FSEESEC-FSE-2005-XieA #memory management
Context- and path-sensitive memory leak detection (YX, AA), pp. 115–125.
ESEC-FSEESEC-FSE-2005-XuC #consistency #middleware #nondeterminism
Inconsistency detection and resolution for context-aware middleware support (CX, SCC), pp. 336–345.
SACSAC-2005-AngiulliBP #predict
Detection and prediction of distance-based outliers (FA, SB, CP), pp. 537–542.
SACSAC-2005-DuanHW #network
Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
SACSAC-2005-ElkhalifaAC #named #specification
InfoFilter: a system for expressive pattern specification and detection over text streams (LE, RA, SC), pp. 1084–1088.
SACSAC-2005-GrunerN #documentation #tool support
Tool support for plagiarism detection in text documents (SG, SN), pp. 776–781.
SACSAC-2005-HouD #analysis #design #search-based
Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
SACSAC-2005-HsiehCLT #named #predict #sequence
EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequences (SJH, YSC, CYL, CYT), pp. 202–203.
SACSAC-2005-JanejaA #linear #named #semantics #statistics
LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows (VPJ, VA), pp. 493–497.
SACSAC-2005-MaG #information retrieval #query
Query length impact on misuse detection in information retrieval systems (LM, NG), pp. 1070–1075.
SACSAC-2005-YangC #algorithm #maturity
The T-detectors maturation algorithm based on match range model (DY, JC), pp. 43–44.
LDTALDTA-2005-Kreimer #adaptation #design
Adaptive Detection of Design Flaws (JK), pp. 117–136.
CASECASE-2005-ChangLJ #fault #network #using
Using a two-layer competitive Hopfield neural network for semiconductor wafer defect detection (CYC, SYL, MJ), pp. 301–306.
DACDAC-2005-GheorghitaSBC #automation #estimation
Automatic scenario detection for improved WCET estimation (SVG, SS, TB, HC), pp. 101–104.
DACDAC-2005-Pomeranz
N-detection under transparent-scan (IP), pp. 129–134.
DATEDATE-2005-AlmukhaizimM #concurrent #fault
Concurrent Error Detection in Asynchronous Burst-Mode Controllers (SA, YM), pp. 1272–1277.
DATEDATE-2005-Campagnolo #generative
eMICAM a New Generation of Active DNA Chip with in Situ Electrochemical Detection (RC), pp. 1338–1339.
DATEDATE-2005-ChiangKSXZ
Bright-Field AAPSM Conflict Detection and Correction (CC, ABK, SS, XX, AZ), pp. 908–913.
DATEDATE-2005-FahmyCL #hardware #markov
Hardware Acceleration of Hidden Markov Model Decoding for Person Detection (SAF, PYKC, WL), pp. 8–13.
DATEDATE-2005-GillNWPG #design #performance
An Efficient BICS Design for SEUs Detection and Correction in Semiconductor Memories (BSG, MN, FGW, CAP, SLG), pp. 592–597.
DATEDATE-2005-HuLDKVI #fault
Compiler-Directed Instruction Duplication for Soft Error Detection (JSH, FL, VD, MTK, NV, MJI), pp. 1056–1057.
DATEDATE-2005-PomeranzR #analysis #testing #worst-case
Worst-Case and Average-Case Analysis of n-Detection Test Sets (IP, SMR), pp. 444–449.
DATEDATE-2005-PomeranzR05a #fault #heuristic
The Accidental Detection Index as a Fault Ordering Heuristic for Full-Scan Circuits (IP, SMR), pp. 1008–1013.
DATEDATE-2005-RaabeBAZ #architecture #hardware #simulation
Hardware Accelerated Collision Detection — An Architecture and Simulation Results (AR, BB, JKA, GZ), pp. 130–135.
DATEDATE-2005-SandireddyA #fault #multi
Diagnostic and Detection Fault Collapsing for Multiple Output Circuits (RKKRS, VDA), pp. 1014–1019.
DATEDATE-2005-StagniGLBR #design
Hardware-Software Design of a Smart Sensor for Fully-Electronic DNA Hybridization Detection (CS, CG, ML, LB, BR), pp. 198–203.
HPCAHPCA-2005-QinLZ #memory management #named
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
HPDCHPDC-2005-LuJ05a #consistency #distributed #framework #grid #nondeterminism #performance
A framework for efficient inconsistency detection in a grid and Internet-scale distributed environment (YL, HJ), pp. 318–319.
SOSPSOSP-2005-JoshiKDC
Detecting past and present intrusions through vulnerability-specific predicates (AJ, STK, GWD, PMC), pp. 91–104.
SOSPSOSP-2005-YuRC #adaptation #named #performance
RaceTrack: efficient detection of data race conditions via adaptive tracking (YY, TR, WC), pp. 221–234.
TACASTACAS-2005-AlurCEM #on the fly #reachability #recursion #state machine
On-the-Fly Reachability and Cycle Detection for Recursive State Machines (RA, SC, KE, PM), pp. 61–76.
TACASTACAS-2005-WeimerN #fault #mining #specification
Mining Temporal Specifications for Error Detection (WW, GCN), pp. 461–476.
AMOSTA-MOST-2005-CaiL #fault #test coverage #testing
The effect of code coverage on fault detection under different testing profiles (XC, MRL), pp. 84–90.
AMOSTA-MOST-2005-Paradkar #case study #effectiveness #fault #generative #modelling #testing
Case studies on fault detection effectiveness of model based test generation techniques (AMP), pp. 70–76.
CAVCAV-2005-OlivainG
The Orchids Intrusion Detection Tool (JO, JGL), pp. 286–290.
CAVCAV-2005-XieA #debugging #named #satisfiability
Saturn: A SAT-Based Tool for Bug Detection (YX, AA), pp. 139–143.
ICTSSTestCom-2005-ChiH #communication #generative #interactive #testing
Test Generation for Interaction Detection in Feature-Rich Communication Systems (CC, RH), pp. 242–257.
ICTSSTestCom-2005-LeeJL #analysis #smarttech #using
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
ICTSSTestCom-2005-LiL05a #algorithm #fault #network #probability #testing
Fault Detection of Hierarchical Networks with Probabilistic Testing Algorithms (KL, DL), pp. 258–274.
VLDBVLDB-2004-KiferBG #data type
Detecting Change in Data Streams (DK, SBD, JG), pp. 180–191.
VLDBVLDB-2004-SnodgrassYC
Tamper Detection in Audit Logs (RTS, S(Y, CSC), pp. 504–515.
VLDBVLDB-2004-ZhangLLW #named
HOS-Miner: A System for Detecting Outlying Subspaces of High-dimensional Data (JZ, ML, TWL, HHW), pp. 1265–1268.
CSMRCSMR-2004-RatiuDGM #design #using
Using History Information to Improve Design Flaws Detection (DR, SD, TG, RM), pp. 223–232.
ICSMEICSM-2004-BruntinkDTE #clone detection #evaluation #identification
An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
ICSMEICSM-2004-Marinescu #design
Detection Strategies: Metrics-Based Rules for Detecting Design Flaws (RM), pp. 350–359.
ICSMEICSM-2004-MemonX #effectiveness #empirical #evaluation #testing
Empirical Evaluation of the Fault-Detection Effectiveness of Smoke Regression Test Cases for GUI-Based Software (AMM, QX), pp. 8–17.
ICSMEICSM-2004-MerloAPR #analysis #clone detection #complexity #evolution #linear #object-oriented #similarity
Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses (EM, GA, MDP, VFR), pp. 412–416.
SCAMSCAM-2004-LakhotiaK #obfuscation #stack
Abstracting Stack to Detect Obfuscated Calls in Binaries (AL, EUK), pp. 17–26.
SCAMSCAM-2004-WahlerSGF #clone detection #source code
Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
WCREWCRE-2004-ArevaloBN #collaboration
Detecting Implicit Collaboration Patterns (GA, FB, ON), pp. 122–131.
CSCWCSCW-2004-GoodallLK #collaboration #network
I know my network: collaboration and expertise in intrusion detection (JRG, WGL, AK), pp. 342–345.
CAiSECAiSE-2004-EderKM #slicing
Analysing Slices of Data Warehouses to Detect Structural Modifications (JE, CK, DM), pp. 492–505.
ICEISICEIS-v2-2004-BoudjeloudP #visualisation
Outlier Detection and Visualisation in High Dimensional Data (LB, FP), pp. 485–488.
ICEISICEIS-v2-2004-DhoteMR #analysis #development #fault
Development of an Expert System for Detecting Incipient Fault in Transformer by Dissolved Gas Analysis (NKD, DMH, MRR), pp. 210–215.
ICEISICEIS-v2-2004-MararCPF #adaptation
Adaptative Techniques for the Human Faces Detection (JFM, DC, OP, EF), pp. 465–468.
ICEISICEIS-v2-2004-MoutinhoTNC #approach #network #using
Face Pattern Detection — an Approach Using Neural Networks (AMM, ACGT, LBN, PHGC), pp. 172–177.
ICEISICEIS-v3-2004-MukkamalaSAR #adaptation #using
Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
ICEISICEIS-v4-2004-MazhelisP #classification
Combining One-Class Classifiers for Mobile-User Substitution Detection (OM, SP), pp. 130–137.
CIKMCIKM-2004-MaG #feedback #information retrieval #using
Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
CIKMCIKM-2004-RenRPS
A vertical distance-based outlier detection method with local pruning (DR, IR, WP, KS), pp. 279–284.
CIKMCIKM-2004-SongB #algorithm #effectiveness #named #performance
BioDIFF: an effective fast change detection algorithm for genomic and proteomic data (YS, SSB), pp. 146–147.
ICMLICML-2004-NguyenWJ #classification #distributed #kernel #using
Decentralized detection and classification using kernel methods (XN, MJW, MIJ).
ICPRICPR-v1-2004-ArcaCL #performance #recognition
An Efficient Method to Detect Facial Fiducial Points for Face Recognition (SA, PC, RL), pp. 532–535.
ICPRICPR-v1-2004-ChenCL #algorithm #robust
A Robust Algorithm of Principal Curve Detection (MC, ZC, YL), pp. 429–432.
ICPRICPR-v1-2004-ChienL #3d #multi
Skin Color Detection in Low Bit-Rate 3-D Multiwavelet-Based Videos (JCC, CCL), pp. 720–723.
ICPRICPR-v1-2004-GllavataEF #classification #image
Text Detection in Images Based on Unsupervised Classification of High-Frequency Wavelet Coefficients (JG, RE, BF), pp. 425–428.
ICPRICPR-v1-2004-HallOC #low level
A Trainable Low-level Feature Detector (PMH, MO, JPC), pp. 708–711.
ICPRICPR-v1-2004-HoriSNK #multi #realtime #using
A Real-Time Multi Face Detection Technique Using Positive-Negative Lines-of-Face Template (YH, KS, YN, TK), pp. 765–768.
ICPRICPR-v1-2004-IlaGC #algorithm #architecture #parallel
Proposal of a Parallel Architecture for a Motion Detection Algorithm (VI, RG, FC), pp. 797–800.
ICPRICPR-v1-2004-JiangLK #recognition
Reference Point Detection for Fingerprint Recognition (XJ, ML, ACK), pp. 540–543.
ICPRICPR-v1-2004-KusachiSIA #image #recognition #robust
Kanji Recognition in Scene Images without Detection of Text Fields — Robust Against Variation of Viewpoint, Contrast, and Background Texture (YK, AS, NI, KA), pp. 457–460.
ICPRICPR-v1-2004-LoogG #probability
Static Posterior Probability Fusion for Signal Detection: Applications in the Detection of Interstitial Diseases in Chest Radiographs (ML, BvG), pp. 644–647.
ICPRICPR-v1-2004-PereraH
Bayesian Object-Level Change Detection in Grayscale Imagery (AGAP, AH), pp. 71–75.
ICPRICPR-v1-2004-PopoviciTRM #algorithm #evaluation #locality #on the #performance
On Performance Evaluation of Face Detection and Localization Algorithms (VP, JPT, YR, SM), pp. 313–317.
ICPRICPR-v1-2004-TodorovicN #image #using
Detection of Artificial Structures in Natural-Scene Images Using Dynamic Trees (ST, MCN), pp. 35–39.
ICPRICPR-v1-2004-WangJW #approach #integration #multi #novel #using #video
A Novel Video Caption Detection Approach Using Multi-Frame Integration (RW, WJ, LW), pp. 449–452.
ICPRICPR-v1-2004-WuAL
Glasses Detection by Boosting Simple Wavelet Features (BW, HA, RL), pp. 292–295.
ICPRICPR-v1-2004-YangFTH #multi #using
Skin Color Detection Using Multiple Cues (JY, ZF, TT, WH), pp. 632–635.
ICPRICPR-v2-2004-BaiH04a #documentation #image #multi #using
Underline Detection and Removal in a Document Image Using Multiple Strategies (ZLB, QH), pp. 578–581.
ICPRICPR-v2-2004-BanerjeeKM #using
Corner Detection Using Support Vector Machines (MB, MKK, PM), pp. 819–822.
ICPRICPR-v2-2004-BoyerJ #order #robust
Perceptual Organization in Range Data: Robust Detection of Low Order Surfaces in Heavy Clutter (KLB, KJ), pp. 102–105.
ICPRICPR-v2-2004-ChennubhotlaJ #distance #normalisation
Perceptual Distance Normalization for Appearance Detection (CC, ADJ), pp. 23–27.
ICPRICPR-v2-2004-EngWKY #framework #robust #using
A Bayesian Framework for Robust Human Detection and Occlusion Handling using Human Shape Model (HLE, JW, AHK, WYY), pp. 257–260.
ICPRICPR-v2-2004-EwerthF #difference #normalisation
Improving Cut Detection in MPEG Videos by GOP-Oriented Frame Difference Normalization (RE, BF), pp. 807–810.
ICPRICPR-v2-2004-EzakiBS #image #towards #visual notation
Text Detection from Natural Scene Images: Towards a System for Visually Impaired Persons (NE, MB, LS), pp. 683–686.
ICPRICPR-v2-2004-FangQ #learning
Learning Sample Subspace with Application to Face Detection (JF, GQ), pp. 423–426.
ICPRICPR-v2-2004-HeY #adaptation
Curvature Scale Space Corner Detector with Adaptive Threshold and Dynamic Region of Support (XCH, NHCY), pp. 791–794.
ICPRICPR-v2-2004-HuangAWL #multi
Boosting Nested Cascade Detector for Multi-View Face Detection (CH, HA, BW, SL), pp. 415–418.
ICPRICPR-v2-2004-KatsoulasW #image
Edge Detection in Range Images of Piled Box-like Objects (DK, AW), pp. 80–84.
ICPRICPR-v2-2004-LiYMKG #realtime
A Real-Time Vehicle Detection and Tracking System in Outdoor Traffic Scenes (XL, XY, YLM, RK, GG), pp. 761–764.
ICPRICPR-v2-2004-LuoYT #algorithm #automation #performance
An Efficient Automatic Redeye Detection and Correction Algorithm (HL, JY, DT), pp. 883–886.
ICPRICPR-v2-2004-PanN #multi #novel
Novel Seed Selection for Multiple Objects Detection and Tracking (ZP, CWN), pp. 744–747.
ICPRICPR-v2-2004-RottensteinerTCKL #multi
Building Detection by Dempster-Shafer Fusion of LIDAR Data and Multispectral Aerial Imagery (FR, JT, SC, KK, BCL), pp. 339–342.
ICPRICPR-v2-2004-SebeCHG #approach #network
Skin Detection: A Bayesian Network Approach (NS, IC, TSH, TG), pp. 903–906.
ICPRICPR-v2-2004-ShihL #analysis #using #video
Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
ICPRICPR-v2-2004-Sidenbladh
Detecting Human Motion with Support Vector Machines (HS), pp. 188–191.
ICPRICPR-v2-2004-TremblaisA #algorithm #multi #performance
A Fast Multiscale Edge Detection Algorithm Based on a New Edge Preserving PDE Resolution Scheme (BT, BA), pp. 811–814.
ICPRICPR-v2-2004-YaoKG #performance #robust
Fast Robust GA-Based Ellipse Detection (JY, NNK, PG), pp. 859–862.
ICPRICPR-v2-2004-YaoZ
Systematic Static Shadow Detection (JY, Z(Z), pp. 76–79.
ICPRICPR-v2-2004-ZhangLG #realtime #using
Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces (DZ, SZL, DGP), pp. 411–414.
ICPRICPR-v2-2004-ZhuLHU #integration #multi
Car Detection Based on Multi-Cues Integration (ZZ, HL, JH, KU), pp. 699–702.
ICPRICPR-v3-2004-CaoF04a #automation
Automatic Morphological Detection of Otolith Nucleus (FC, RF), pp. 606–609.
ICPRICPR-v3-2004-ChenB04a #image
Human Ear Detection from Side Face Range Images (HC, BB), pp. 574–577.
ICPRICPR-v3-2004-ChenCG #adaptation #algorithm #search-based #self
Resampling for Face Detection by Self-Adaptive Genetic Algorithm (JC, XC, WG), pp. 822–825.
ICPRICPR-v3-2004-DEliaMMPST #classification #clustering #segmentation
Detection of Microcalcifications Clusters in Mammograms through TS-MRF Segmentation and SVM-based Classification (CD, CM, MM, GP, GS, FT), pp. 742–745.
ICPRICPR-v3-2004-DOrazioLCD #algorithm #image #realtime
An Algorithm for Real Time Eye Detection in Face Images (TD, ML, GC, AD), pp. 278–281.
ICPRICPR-v3-2004-ErikssonA #robust
Robustness and Specificity in Object Detection (APE, ), pp. 87–90.
ICPRICPR-v3-2004-FaragEGF #recognition #using
Detection and Recognition of Lung Abnormalities Using Deformable Templates (AAF, AEB, GLG, RF), pp. 738–741.
ICPRICPR-v3-2004-ForestSCP #3d #approach
Laser Stripe Peak Detector for 3D Scanners. A FIR Filter Approach (JF, JS, EC, CP), pp. 646–649.
ICPRICPR-v3-2004-FusseneggerOPA #recognition #segmentation #using
Object Recognition Using Segmentation for Feature Detection (MF, AO, AP, PA), pp. 41–44.
ICPRICPR-v3-2004-HautamakiKF #graph #nearest neighbour #using
Outlier Detection Using k-Nearest Neighbour Graph (VH, IK, PF), pp. 430–433.
ICPRICPR-v3-2004-HuangSK #approach #multi #robust
A Multi-Expert Approach for Robust Face Detection (LLH, AS, HK), pp. 942–945.
ICPRICPR-v3-2004-HuangT #estimation #realtime #robust #video
Robust Real-Time Detection, Tracking, and Pose Estimation of Faces in Video Streams (KSH, MMT), pp. 965–968.
ICPRICPR-v3-2004-IshiiHYN #realtime
Face and Head Detection for a Real-Time Surveillance System (YI, HH, KY, YN), pp. 298–301.
ICPRICPR-v3-2004-JiaMSC #fault #realtime
An Intelligent Real-time Vision System for Surface Defect Detection (HJ, YLM, JS, TSC), pp. 239–242.
ICPRICPR-v3-2004-JiaQD #markov #modelling #online
An Advanced Segmental Semi-Markov Model Based Online Series Pattern Detection (SJ, YQ, GD), pp. 634–637.
ICPRICPR-v3-2004-KapoorPI #multi #probability
Probabilistic Combination of Multiple Modalities to Detect Interest (AK, RWP, YI), pp. 969–972.
ICPRICPR-v3-2004-KellerS #algebra #approach #symmetry
An Algebraic Approach to Symmetry Detection (YK, YS), pp. 186–189.
ICPRICPR-v3-2004-KolschT #analysis #robust
Analysis of Rotational Robustness of Hand Detection with a Viola-Jones Detector (MK, MT), pp. 107–110.
ICPRICPR-v3-2004-LanMZ #multimodal #using
Multi-level Anchorperson Detection Using Multimodal Association (DJL, YFM, HZ), pp. 890–893.
ICPRICPR-v3-2004-LiCKG #classification #image
Detecting Abnormal Regions in Colonoscopic Images by Patch-based Classifier Ensemble (PL, KLC, SMK, YG), pp. 774–777.
ICPRICPR-v3-2004-NadimiB #adaptation
Adaptive Fusion for Diurnal Moving Object Detection (SN, BB), pp. 696–699.
ICPRICPR-v3-2004-NakaiTHOO
A Practical Stereo Scheme for Obstacle Detection in Automotive Use (HN, NT, HH, YO, KO), pp. 346–350.
ICPRICPR-v3-2004-RamstromC #using
Object Detection using Background Context (OR, HIC), pp. 45–48.
ICPRICPR-v3-2004-ShimizuYWSTN #mobile
Moving Object Detection with Mobile Stereo Omni-directional System (SOS) based on Motion Compensatory Inter-frame Depth Subtraction (SS, KY, CW, YS, HT, YN), pp. 248–251.
ICPRICPR-v3-2004-SugimotoTTO #image #sequence #using #visualisation
Obstacle Detection Using Millimeter-Wave Radar and Its Visualization on Image Sequence (SS, HT, HT, MO), pp. 342–345.
ICPRICPR-v3-2004-TerrillonPNY #multi #realtime #recognition #robust #sequence #video
DRUIDE : A Real-Time System for Robust Multiple Face Detection, Tracking and Hand Posture Recognition in Color Video Sequences (JCT, AP, YN, KY), pp. 302–305.
ICPRICPR-v3-2004-UnsalanB #image #multi #network
A System to Detect Houses and Residential Street Networks in Multispectral Satellite Images (, KLB), pp. 49–52.
ICPRICPR-v3-2004-YapCLHP #analysis
Detecting Femur Fractures by Texture Analysis of Trabeculae (DWHY, YC, WKL, TSH, MAP), pp. 730–733.
ICPRICPR-v4-2004-ChangL #flexibility
Detecting Deformable Objects with Flexible Shape Priors (TLC, TLL), pp. 155–158.
ICPRICPR-v4-2004-ChanHSP #semantics #using #video
Detecting Rare Events in Video Using Semantic Primitives with HMM (MTC, AH, JS, MP), pp. 150–154.
ICPRICPR-v4-2004-DavisS #people #robust
Robust Detection of People in Thermal Imagery (JWD, VS), pp. 713–716.
ICPRICPR-v4-2004-FuYHT #clustering #multi #using
Mixture Clustering Using Multidimensional Histograms for Skin Detection (ZF, JY, WH, TT), pp. 549–552.
ICPRICPR-v4-2004-GoniEVC #algorithm #eye tracking #robust
Robust Algorithm for Pupil-Glint Vector Detection in a Video-oculography Eyetracking System (SG, JE, AV, RC), pp. 941–944.
ICPRICPR-v4-2004-HagaSY #analysis #using
Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
ICPRICPR-v4-2004-HeroorC #graph #segmentation
Affine Layer Segmentation and Adjacency Graphs for Vortex Detection (SH, IC), pp. 223–226.
ICPRICPR-v4-2004-IwaseS #image #parallel
Parallel Tracking of All Soccer Players by Integrating Detected Positions in Multiple View Images (SI, HS), pp. 751–754.
ICPRICPR-v4-2004-JeongKH #image
Appearance-Based Nude Image Detection (CYJ, JSK, KSH), pp. 467–470.
ICPRICPR-v4-2004-JinSS #adaptation #algorithm #image #novel
A Novel Adaptive Image Enhancement Algorithm for Face Detection (LJ, SS, MS), pp. 843–848.
ICPRICPR-v4-2004-KwonP #image #quality
Optimum Block Size Detection for Image Quality Measure (YBK, JP), pp. 491–494.
ICPRICPR-v4-2004-LeeNG #automation
Automated Detection of Solar Loops by the Oriented Connectivity Method (JKL, TSN, GAG), pp. 315–318.
ICPRICPR-v4-2004-LiuA
Vision Based Fire Detection (CBL, NA), pp. 134–137.
ICPRICPR-v4-2004-Nait-CharifM #process #summary
Activity Summarisation and Fall Detection in a Supportive Home Environment (HNC, SJM), pp. 323–326.
ICPRICPR-v4-2004-Orrite-UrunuelaRJR #2d #3d #modelling
2D Silhouette and 3D Skeletal Models for Human Detection and Tracking (COU, JMdR, JEHJ, GR), pp. 244–247.
ICPRICPR-v4-2004-PiriouBY #image #modelling #probability
Learned Probabilistic Image Motion Models for Event Detection in Videos (GP, PB, JFY), pp. 207–210.
ICPRICPR-v4-2004-SchloglBWB #evaluation #metric #performance
Performance Evaluation Metrics for Motion Detection and Tracking (TS, CB, MW, HB), pp. 519–522.
ICPRICPR-v4-2004-SelmaouiRLA #analysis #image
Image Analysis for Core Geological Descriptions : Strata and Granulometry Detection (NS, BR, CLM, MA), pp. 305–310.
ICPRICPR-v4-2004-ShettyR #classification #modelling
An Undecimated Wavelet Transform Based Denoising, PPCA Based Pulse Modeling and Detection-Classification of PD Signals (PKS, TSR), pp. 873–876.
ICPRICPR-v4-2004-SialaCCB
Moving Shadow Detection with Support Vector Domain Description in the Color Ratios Space (KS, MC, FC, OB), pp. 384–387.
ICPRICPR-v4-2004-SinghS #comparison #image
A Comparison of Image Enhancement Techniques for Explosive Detection (MS, SS), pp. 811–814.
ICPRICPR-v4-2004-TongLL #effectiveness #performance
An Effective and Fast Soccer Ball Detection and Tracking Method (XFT, HQL, QSL), pp. 795–798.
ICPRICPR-v4-2004-TothSWA #clustering #using
Detection of Moving Shadows using Mean Shift Clustering and a Significance Test (DT, IS, AW, TA), pp. 260–263.
ICPRICPR-v4-2004-UtsumiTI #3d #interactive
View-Based Detection of 3-D Interaction between Hands and Real Objects (AU, NT, SI), pp. 961–964.
ICPRICPR-v4-2004-WangJ #multi
Multi-View Face Detection under Complex Scene based on Combined SVMs (PW, QJ), pp. 179–182.
ICPRICPR-v4-2004-YangFTH04a #approach #image #novel
A Novel Approach to Detecting Adult Images (JY, ZF, TT, WH), pp. 479–482.
ICPRICPR-v4-2004-YangL #multi
Multiple Pedestrian Detection and Tracking based on Weighted Temporal Texture Features (HDY, SWL), pp. 248–251.
ICPRICPR-v4-2004-YingH04a #using
Catadioptric Line Features Detection using Hough Transform (XY, ZH), pp. 839–842.
ICPRICPR-v4-2004-ZhaiRS #finite #state machine #using
Conversation Detection in Feature Films Using Finite State Machines (YZ, ZR, MS), pp. 458–461.
KDDKDD-2004-Donoho
Early detection of insider trading in option markets (SD), pp. 420–429.
KDDKDD-2004-IdeK
Eigenspace-based anomaly detection in computer systems (TI, HK), pp. 440–449.
KDDKDD-2004-Iyengar #clustering #on the
On detecting space-time clusters (VSI), pp. 587–592.
KDDKDD-2004-KolczCA #robust
Improved robustness of signature-based near-replica detection via lexicon randomization (AK, AC, JA), pp. 605–610.
KDDKDD-2004-KolterM #bytecode #learning
Learning to detect malicious executables in the wild (JZK, MAM), pp. 470–478.
KDDKDD-2004-LazarevicKK #effectiveness #locality #scalability
Effective localized regression for damage detection in large complex mechanical structures (AL, RK, CK), pp. 450–459.
KDDKDD-2004-NeillM #agile #clustering
Rapid detection of significant spatial clusters (DBN, AWM), pp. 256–265.
KDDKDD-2004-ShavlikS #effectiveness #evaluation
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage (JWS, MS), pp. 276–285.
KDDKDD-2004-YoshidaAWMHNFY
Density-based spam detector (KY, FA, TW, HM, TH, AN, HF, KY), pp. 486–493.
SEKESEKE-2004-XingS #co-evolution
Data-mining in Support of Detecting Class Co-evolution (ZX, ES), pp. 123–128.
SIGIRSIGIR-2004-ConradS #corpus
Constructing a text corpus for inexact duplicate detection (JGC, CPS), pp. 582–583.
SIGIRSIGIR-2004-DAmore #community
Expertise community detection (RJD), pp. 498–499.
SIGIRSIGIR-2004-GowederPR #information retrieval
Broken plural detection for arabic information retrieval (AG, MP, ANDR), pp. 566–567.
SIGIRSIGIR-2004-KumaranA #classification
Text classification and named entities for new event detection (GK, JA), pp. 297–304.
SIGIRSIGIR-2004-ZhangV04a #query
Detection and translation of OOV terms prior to query time (YZ, PV), pp. 524–525.
UMLUML-2004-BauerdickGG #case study #experience #ocl #uml
Detecting OCL Traps in the UML 2.0 Superstructure: An Experience Report (HB, MG, FG), pp. 188–196.
AdaEuropeAdaEurope-2004-BreuerG #concurrent #kernel #linux
Static Deadlock Detection in the Linux Kernel (PTB, MGV), pp. 52–64.
ASEASE-2004-RysselbergheD #clone detection #perspective #refactoring
Evaluating Clone Detection Techniques from a Refactoring Perspective (FVR, SD), pp. 336–339.
ASEASE-2004-Taghdiri #fault #specification
Inferring Specifications to Detect Errors in Code (MT), pp. 144–153.
ASEASE-2004-XieMN #framework #named #object-oriented #testing
Rostra: A Framework for Detecting Redundant Object-Oriented Unit Tests (TX, DM, DN), pp. 196–205.
FSEFSE-2004-PerkinsE #algorithm #incremental #invariant #performance
Efficient incremental algorithms for dynamic detection of likely invariants (JHP, MDE), pp. 23–32.
SACSAC-2004-AdamJA #dataset
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets (NRA, VPJ, VA), pp. 576–583.
SACSAC-2004-AmorBE #naive bayes
Naive Bayes vs decision trees in intrusion detection systems (NBA, SB, ZE), pp. 420–424.
SACSAC-2004-BistarelliFO #constraints #modelling #problem #using
Modeling and detecting the cascade vulnerability problem using soft constraints (SB, SNF, BO), pp. 383–390.
SACSAC-2004-FengBM #array
Time-frequency feature detection for time-course microarray data (JF, PEB, BM), pp. 128–132.
SACSAC-2004-HuP #approach #data mining #database #mining
A data mining approach for database intrusion detection (YH, BP), pp. 711–716.
SACSAC-2004-SiaterlisM #data fusion #multi #towards
Towards multisensor data fusion for DoS detection (CS, BSM), pp. 439–446.
SACSAC-2004-ZaneroS #learning
Unsupervised learning techniques for an intrusion detection system (SZ, SMS), pp. 412–419.
ASPLOSASPLOS-2004-HauswirthC #adaptation #memory management #profiling #statistics #using
Low-overhead memory leak detection using adaptive statistical profiling (MH, TMC), pp. 156–164.
ASPLOSASPLOS-2004-SmolensGKFHN #bound #latency #named
Fingerprinting: bounding soft-error detection latency and bandwidth (JCS, BTG, JK, BF, JCH, AN), pp. 224–234.
DACDAC-2004-DargaLSM #symmetry
Exploiting structure in symmetry detection for CNF (PTD, MHL, KAS, ILM), pp. 530–534.
DACDAC-2004-Iyer #fault
Hierarchical application aware error detection and recovery (RKI), p. 79.
DACDAC-2004-JeongN #performance
Fast hazard detection in combinational circuits (CJ, SMN), pp. 592–595.
DACDAC-2004-WangC #symmetry
Symmetry detection for incompletely specified functions (KHW, JHC), pp. 434–437.
DATEDATE-v1-2004-AlmukhaizimDM #bound #concurrent #fault #latency #on the
On Concurrent Error Detection with Bounded Latency in FSMs (SA, PD, YM), pp. 596–603.
DATEDATE-v1-2004-PomeranzVRS #fault
Z-Sets and Z-Detections: Circuit Characteristics that Simplify Fault Diagnosis (IP, SV, SMR, BS), pp. 68–75.
DATEDATE-v2-2004-DworakCWM #fault
Balanced Excitation and Its Effect on the Fortuitous Detection of Dynamic Defects (JD, BC, JW, MRM), pp. 1066–1071.
PDPPDP-2004-Borkowski #consistency #distributed #online
Strongly Consistent Global State Detection for On-line Control of Distributed Applications (JB), pp. 126–133.
PDPPDP-2004-MaciasSS #monitoring #performance #source code
Efficient Monitoring to Detect Wireless Channel Failures for MPI Programs (EMM, ÁS, VSS), pp. 374–381.
ESOPESOP-2004-Mine #abstract domain #fault #float #relational #runtime
Relational Abstract Domains for the Detection of Floating-Point Run-Time Errors (AM), pp. 3–17.
SATSAT-2004-LewisSB #satisfiability
Early Conflict Detection Based BCP for SAT Solving (MDTL, TS, BB), pp. 29–36.
SATSAT-2004-NishimuraRS #set
Detecting Backdoor Sets with Respect to Horn and Binary Clauses (NN, PR, SS), pp. 96–103.
DRRDRR-2003-AradhyeHM #analysis #recognition
Syntax-directed content analysis of videotext: application to a map detection recognition system (HBA, JAH, GKM), pp. 57–66.
TPDLECDL-2003-BollenLVX #library #research #roadmap
Detecting Research Trends in Digital Library Readership (JB, RL, SV, WX), pp. 24–28.
TPDLECDL-2003-MakkonenA #topic
Utilizing Temporal Information in Topic Detection and Tracking (JM, HAM), pp. 393–404.
HTHT-2003-AmitayCDLS
The connectivity sonar: detecting site functionality by structural patterns (EA, DC, AD, RL, AS), pp. 38–47.
ICDARICDAR-2003-ChenZ #recognition
Photo time-stamp detection and recognition (XRC, HZ), pp. 319–322.
ICDARICDAR-2003-Kasturi
Detection of Text Marks on Moving Vehicles Vladimir Y. Mariano (RK), pp. 393–397.
ICDARICDAR-2003-MandalCDC #automation #documentation #image #segmentation
Automated Detection and Segmentation of Table of Contents Page from Document Images (SM, SPC, AKD, BC), pp. 398–402.
ICDARICDAR-2003-NomuraMUS #segmentation
Detection and Segmentation of Touching Characters in Mathematical Expression (AN, KM, SU, MS), pp. 126–130.
ICDARICDAR-2003-RamelCVF #representation
Detection, Extraction and Representation of Tables (JYR, MC, NV, CF), pp. 374–378.
ICDARICDAR-2003-ShiG #documentation #fuzzy #image #using
Skew Detection for Complex Document Images Using Fuzzy Runlength (ZS, VG), pp. 715–719.
ICDARICDAR-2003-ToshihiroM #documentation #image #matrix #segmentation
Detection of Matrices and Segmentation of Matrix Elements in Scanned Images of Scientific Documents (KT, SM), pp. 433–437.
ICDARICDAR-2003-YuanT #documentation #named
Skewscope: The Textual Document Skew Detector (BY, CLT), pp. 49–53.
ICDARICDAR-2003-ZhengLD #algorithm #documentation #modelling
A Model-based Line Detection Algorithm in Documents (YZ, HL, DSD), pp. 44–48.
JCDLJCDL-2003-KurtzM #online #topic
Topic Detection and Interest Tracking in a Dynamic Online News Source (AJK, JM), pp. 122–124.
ITiCSEITiCSE-2003-CeraCHLNPZ
High-tech dishonesty: cheating, plagiarism and detection (CDC, BWC, NH, RNL, AN, JLP, PZ), p. 244.
IWPCIWPC-2003-HeuzerothHHL #automation #design pattern
Automatic Design Pattern Detection (DH, TH, GH, WL), pp. 94–104.
IWPCIWPC-2003-LakhotiaLWY #benchmark #clone detection #metric #towards
Towards a Clone Detection Benchmark Suite and Results Archive (AL, JL, AW, YY), pp. 285–287.
SCAMSCAM-2003-Leitao #2d #using
Detection of Redundant Code using R2D2 (AML), pp. 183–192.
SCAMSCAM-2003-PearceKH #analysis #difference #online #pointer
Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
WCREWCRE-2003-WalensteinJLYL #clone detection #problem
Problems Creating Task-relevant Clone Detection Reference Data (AW, NJ, JL, YY, AL), pp. 285–295.
WCREWCRE-2003-ZouG #analysis #using
Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
ICEISICEIS-v2-2003-BelgacemCR #network
Detection of Cardiac Arrhythmias By Neural Networks (NB, MAC, FBR), pp. 414–417.
ICEISICEIS-v3-2003-HoangHB #data mining #mining
Intrusion Detection Based on Data Mining (XDH, JH, PB), pp. 341–346.
CIKMCIKM-2003-CatheyMGG #information retrieval
Misuse detection for information retrieval systems (RC, LM, NG, DAG), pp. 183–190.
CIKMCIKM-2003-ConradGS #documentation #online #reliability #retrieval
Online duplicate document detection: signature reliability in a dynamic retrieval environment (JGC, XSG, CPS), pp. 443–452.
CIKMCIKM-2003-RamaswamyILD #performance #web
Techniques for efficient fragment detection in web pages (LR, AI, LL, FD), pp. 516–519.
CIKMCIKM-2003-WhiteJR #approach
An approach for implicitly detecting information needs (RW, JMJ, IR), pp. 504–507.
ECIRECIR-2003-MakkonenAS #topic
Topic Detection and Tracking with Spatio-Temporal Evidence (JM, HAM, MS), pp. 251–265.
ECIRECIR-2003-WuGC #documentation
Experiments with Document Archive Size Detection (SW, FG, FC), pp. 294–304.
ICMLICML-2003-WongMCW #network
Bayesian Network Anomaly Pattern Detection for Disease Outbreaks (WKW, AWM, GFC, MMW), pp. 808–815.
KDDKDD-2003-BilenkoM #adaptation #metric #similarity #string #using
Adaptive duplicate detection using learnable string similarity measures (MB, RJM), pp. 39–48.
KDDKDD-2003-MaP #online #sequence
Online novelty detection on temporal sequences (JM, SP), pp. 613–618.
KDDKDD-2003-NobleC #graph
Graph-based anomaly detection (CCN, DJC), pp. 631–636.
KDDKDD-2003-OteyPGLNP #towards
Towards NIC-based intrusion detection (MEO, SP, AG, GL, SN, DKP), pp. 723–728.
KDDKDD-2003-WebbBN #difference #on the
On detecting differences between groups (GIW, SMB, DAN), pp. 256–265.
KDDKDD-2003-ZhuS #data type #performance
Efficient elastic burst detection in data streams (YZ, DS), pp. 336–345.
MLDMMLDM-2003-ImiyaTOH #bound #random #set
Detecting the Boundary Curve of Planar Random Point Set (AI, KT, HO, VH), pp. 413–424.
SEKESEKE-2003-SouzaORGR #consistency #modelling #nondeterminism #re-engineering #using
Using Critiquing Systems for Inconsistency Detection in Software Engineering Models (CRBdS, HLRO, CRPdR, KMG, DFR), pp. 196–203.
SIGIRSIGIR-2003-AllanWB #retrieval
Retrieval and novelty detection at the sentence level (JA, CW, AB), pp. 314–321.
SIGIRSIGIR-2003-BrantsC
A System for new event detection (TB, FC), pp. 330–337.
SIGIRSIGIR-2003-FengZP #music #retrieval
Popular music retrieval by detecting mood (YF, YZ, YP), pp. 375–376.
OOPSLAOOPSLA-2003-DemskyR #automation #data type #fault
Automatic detection and repair of errors in data structures (BD, MCR), pp. 78–95.
PLDIPLDI-2003-DorRS #c #named #towards
CSSV: towards a realistic tool for statically detecting all buffer overflows in C (ND, MR, SS), pp. 155–167.
PLDIPLDI-2003-HeineL #c #c++ #memory management
A practical flow-sensitive and context-sensitive C and C++ memory leak detector (DLH, MSL), pp. 168–181.
ASEASE-2003-AhmadAGK #fault #spreadsheet #type system
A Type System for Statically Detecting Spreadsheet Errors (YA, TA, SG, SK), pp. 174–183.
ASEASE-2003-GuptaH #invariant #test coverage
A New Structural Coverage Criterion for Dynamic Detection of Program Invariants (NG, ZVH), pp. 49–59.
ASEASE-2003-HeuzerothML #design pattern #generative #specification
Generating Design Pattern Detectors from Pattern Specifications (DH, SM, WL), pp. 245–248.
ASEASE-2003-ShehataE #framework #interactive #requirements
Detecting Requirements Interactions: A Three-Level Framework (MS, AE), pp. 352–355.
ESEC-FSEESEC-FSE-2003-LivshitsL #c #context-sensitive grammar #debugging #pointer #source code
Tracking pointers with path and context sensitivity for bug detection in C programs (VBL, MSL), pp. 317–326.
ESEC-FSEESEC-FSE-2003-VignaVK #design #implementation #product line
Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
ESEC-FSEESEC-FSE-2003-XieCE #analysis #fault #memory management #named #using
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
ICSEICSE-2003-KemmererV #internet #security
Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
SACSAC-2003-BarbaraLLJC #data mining #mining
Bootstrapping a Data Mining Intrusion Detection System (DB, YL, JLL, SJ, JC), pp. 421–425.
SACSAC-2003-Mahoney #network
Network Traffic Anomaly Detection Based on Packet Bytes (MVM), pp. 346–350.
CCCC-2003-NguyenIAC #automation
Automatic Detection of Uninitialized Variables (TVNN, FI, CA, FC), pp. 217–231.
DACDAC-2003-PomeranzR #on the #testing
On test data compression and n-detection test sets (IP, SMR), pp. 748–751.
DATEDATE-2003-DrineasM #concurrent #fault #monitoring
Non-Intrusive Concurrent Error Detection in FSMs through State/Output Compaction and Monitoring via Parity Trees (PD, YM), pp. 11164–11167.
DATEDATE-2003-MangerucaFSPP #case study #design #embedded
System Level Design of Embedded Controllers: Knock Detection, A Case Study in the Automotive Domain (LM, AF, ALSV, AP, MP), pp. 20232–20237.
DATEDATE-2003-NicolescuV #approach #fault #tool support
Detecting Soft Errors by a Purely Software Approach: Method, Tools and Experimental Results (BN, RV), pp. 20057–20063.
DATEDATE-2003-PomeranzRK #fault #on the
On the Characterization of Hard-to-Detect Bridging Faults (IP, SMR, SK), pp. 11012–11019.
DATEDATE-2003-PradhanLC #fault #generative #named #novel
EBIST: A Novel Test Generator with Built-In Fault Detection Capability (DKP, CL, KC), pp. 10224–10229.
DATEDATE-2003-VanasscheGS #analysis #domain model #modelling
Time-Varying, Frequency-Domain Modeling and Analysis of Phase-Locked Loops with Sampling Phase-Frequency Detectors (PV, GGEG, WMCS), pp. 10238–10243.
PDPPDP-2003-CordobaFGMV #algorithm #communication #concurrent #distributed
A Low Communication Cost Algorithm for Distributed Deadlock Detection and Resolution (AC, FF, JRG, JRGdM, JEV), pp. 235–242.
PPoPPPPoPP-2003-OCallahanC #concurrent #hybrid
Hybrid dynamic data race detection (RO, JDC), pp. 167–178.
PPoPPPPoPP-2003-PoznianskyS #c++ #concurrent #multi #on the fly #performance #source code
Efficient on-the-fly data race detection in multihreaded C++ programs (EP, AS), pp. 179–190.
SOSPSOSP-2003-EnglerA #effectiveness #named #static analysis
RacerX: effective, static detection of race conditions and deadlocks (DRE, KA), pp. 237–252.
FASEFASE-2003-Muccini #branch
Detecting Implied Scenarios Analyzing Non-local Branching Choices (HM), pp. 372–386.
CAVCAV-2003-ArmoniFFGPTV #linear #logic
Enhanced Vacuity Detection in Linear Temporal Logic (RA, LF, AF, OG, NP, AT, MYV), pp. 368–380.
JCDLJCDL-2002-Smith
Detecting events with date and place information in unstructured text (DAS), pp. 191–196.
VLDBVLDB-2002-ChoN #effectiveness #using
Effective Change Detection Using Sampling (JC, AN), pp. 514–525.
SCAMSCAM-J-2001-ChenXYZ02 #ada #concurrent
Concurrent Ada dead statements detection (ZC, BX, HY, JZ), pp. 733–741.
ICSMEICSM-2002-Schneidewind #fault
An Integrated Failure Detection and Fault Correction Model (NFS), pp. 238–241.
SCAMSCAM-2002-BurdB #clone detection #maintenance #tool support
Evaluating Clone Detection Tools for Use during Preventative Maintenance (EB, JB), pp. 36–43.
WCREWCRE-2002-EmdenM #assurance #java #quality #smell
Java Quality Assurance by Detecting Code Smells (EVE, LM), p. 97–?.
IFMIFM-2002-ZulkernineS #algorithm #automation
Assume-Guarantee Algorithms for Automatic Detection of Software Failures (MZ, RES), pp. 89–108.
ICGTICGT-2002-GodardMMS #algorithm #distributed #graph #termination
Termination Detection of Distributed Algorithms by Graph Relabelling Systems (EG, YM, MM, AS), pp. 106–119.
EDOCEDOC-2002-DunlopIR
Dynamic Conflict Detection in Policy-Based Management Systems (ND, JI, KR), pp. 15–26.
ICEISICEIS-2002-LowLT #database #named #transaction
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions (WLL, JL, PT), pp. 121–128.
CIKMCIKM-2002-CooperCB #documentation #using
Detecting similar documents using salient terms (JWC, AC, EWB), pp. 245–251.
ICMLICML-2002-MusleaMK02a #adaptation #automation #towards #validation
Adaptive View Validation: A First Step Towards Automatic View Detection (IM, SM, CAK), pp. 443–450.
ICPRICPR-v1-2002-AiYX #approach
A Subspace Approach to Face Detection with Support Vector Machines (HA, LY, GX), pp. 45–48.
ICPRICPR-v1-2002-ArakiSS
Detection of Faces of Various Directions in Complex Backgrounds (YA, NS, YS), pp. 409–412.
ICPRICPR-v1-2002-Bayro-CorrochanoA #approach #geometry
Geometric Approach for Pose Detection of Moving Human Heads (EBC, AA), pp. 636–639.
ICPRICPR-v1-2002-CaronMV
A Method for Detecting Artificial Objects in Natural Environments (YC, PM, NV), pp. 600–603.
ICPRICPR-v1-2002-ChazalRH #automation #metric #using #variability
Automatic Sleep Apnoea Detection Using Measures of Amplitude and Heart Rate Variability from the Electrocardiogram (PdC, RBR, CH), pp. 775–778.
ICPRICPR-v1-2002-DattaSL #video
Person-on-Person Violence Detection in Video Data (AD, MS, NdVL), pp. 433–438.
ICPRICPR-v1-2002-DOrazioACN #algorithm #image #sequence
A Ball Detection Algorithm for Real Soccer Image Sequences (TD, NA, GC, MN), pp. 210–213.
ICPRICPR-v1-2002-ErdemS #automation #communication #gesture
Automatic Detection of Relevant Head Gestures in American Sign Language Communication (UME, SS), p. 460–?.
ICPRICPR-v1-2002-FleuretG #estimation #performance #precise
Fast Face Detection with Precise Pose Estimation (FF, DG), p. 235–?.
ICPRICPR-v1-2002-JiangM #algorithm #evaluation
Supervised Evaluation Methodology for Curvilinear Structure Detection Algorithms (XJ, DM), pp. 103–106.
ICPRICPR-v1-2002-KimMK #approach
Wavelet-Based Morphological Approach for Detection of Human Face Region (JBK, CHM, HJK), pp. 417–420.
ICPRICPR-v1-2002-KimuraW #2d #invariant
An Extension of the Generalized Hough Transform to Realize Affine-Invariant Two-dimensional (2D) Shape Detection (AK, TW), pp. 65–69.
ICPRICPR-v1-2002-KrishnamoorthyBF #modelling #robust
Robust Detection of Buildings in Digital Surface Models (PK, KLB, PJF), pp. 159–163.
ICPRICPR-v1-2002-LuoE #approach
A Physics-Motivated Approach to Detecting Sky in Photographs (JL, SPE), pp. 155–158.
ICPRICPR-v1-2002-LuWL
A Target Detection Method in Range-Doppler Domain from SAR Echo Data (LL, RW, WL), pp. 91–94.
ICPRICPR-v1-2002-MaD
Face Detection Based on Hierarchical Support Vector Machines (YM, XD), pp. 222–225.
ICPRICPR-v1-2002-PengYW #image #similarity
Images Similarity Detection Based on Directional Gradient Angular Histogram (JP, BY, DW), pp. 147–150.
ICPRICPR-v1-2002-SongCL #image #performance
Edge Color Distribution Transform: An Efficient Tool for ObjectDetection in Images (JS, MC, MRL), pp. 608–612.
ICPRICPR-v1-2002-TerrillonPNY #human-computer #image #interactive #recognition #robust
Robust Face Detection and Hand Posture Recognition in Color Images for Human-Machine Interaction (JCT, AP, YN, KY), pp. 204–209.
ICPRICPR-v1-2002-Worthington #consistency #using
Enhanced Canny Edge Detection Using Curvature Consistency (PLW), pp. 596–599.
ICPRICPR-v1-2002-YuanGY #robust
Robust Frontal Face Detection in Complex Environment (QY, WG, HY), pp. 25–28.
ICPRICPR-v2-2002-AnconaCSD #complexity #image #parametricity #runtime
Object Detection in Images: Run-Time Complexity and Parameter Selection of Support Vector Machines (NA, GC, ES, AD), pp. 426–429.
ICPRICPR-v2-2002-Arana-ArejolaleibaLBLH #navigation #visual notation
A Smart Sensor Based Visual Landmarks Detection for Indoor Robot Navigation (NAA, FL, MB, CL, JBH), pp. 848–851.
ICPRICPR-v2-2002-BorghysLP #image
Edge and Line Detection in Polarimetric SAR Images (DB, VL, CP), pp. 921–924.
ICPRICPR-v2-2002-BredecheCH #mobile
Wrapper for Object Detection in an Autonomous Mobile Robot (NB, YC, LH), pp. 749–752.
ICPRICPR-v2-2002-ChangHHC #effectiveness #modelling
Shadow Elimination for Effective Moving Object Detection with Gaussian Models (CJC, WFH, JWH, YSC), pp. 540–543.
ICPRICPR-v2-2002-ChennubhotlaJM #invariant #robust
Robust Contrast-Invariant EigenDetection (CC, ADJ, JM), pp. 745–748.
ICPRICPR-v2-2002-GarciaD #architecture #performance #robust
A Neural Architecture for Fast and Robust Face Detection (CG, MD), pp. 44–47.
ICPRICPR-v2-2002-GiacintoR #classification #multi #network
Intrusion Detection in Computer Networks by Multiple Classifier Systems (GG, FR), pp. 390–393.
ICPRICPR-v2-2002-Gomez #component #on the
On Selecting Colour Components for Skin Detection (GG), pp. 961–964.
ICPRICPR-v2-2002-GuimaraesACL #identification #video
Video Fade Detection by Discrete Line Identification (SJFG, AdAA, MC, NJL), pp. 1013–1016.
ICPRICPR-v2-2002-HuangSK #network #using
Face Detection Using a Modified Radial Basis Function Neural Network (LLH, AS, HK), pp. 342–345.
ICPRICPR-v2-2002-KawanishiMT #3d #locality #multi
Quick 3D Object Detection and Localization by Dynamic Active Search with Multiple Active Cameras (TK, HM, ST), pp. 605–608.
ICPRICPR-v2-2002-KimJKS #clustering #segmentation #word
Word Segmentation of Printed Text Lines Based on Gap Clustering and Special Symbol Detection (SHK, CBJ, HKK, CYS), pp. 320–323.
ICPRICPR-v2-2002-KimLLKK #approach #multi #video
Integrated Approach of Multiple Face Detection for Video Surveillance (TKK, SUL, JHL, SCK, SRK), pp. 394–397.
ICPRICPR-v2-2002-KirshnerCSKC #modelling #probability
Probabilistic Model-Based Detection of Bent-Double Radio Galaxies (SK, IVC, PS, CK, ECP), pp. 499–502.
ICPRICPR-v2-2002-KovacsS #animation #probability
Creating Animations Combining Stochastic Paintbrush Transformation and Motion Detection (LK, TS), p. 1090–?.
ICPRICPR-v2-2002-LudtkeLHW #using
Corner Detection Using a Mixture Model of Edge Orientation (NL, BL, ERH, RCW), pp. 574–577.
ICPRICPR-v2-2002-LuZ #realtime
Real-Time Unsupervised Speaker Change Detection (LL, HZ), pp. 358–361.
ICPRICPR-v2-2002-MiyauchiHBK #analysis #collaboration #multi #semantics #video
Collaborative Multimedia Analysis for Detecting Semantical Events from Broadcasted Sports Video (SM, AH, NB, TK), pp. 1009–1012.
ICPRICPR-v2-2002-NadimiB #approach #using
Moving Shadow Detection Using a Physics-Based Approach (SN, BB), pp. 701–704.
ICPRICPR-v2-2002-OlagueH #flexibility #metric #modelling #multi #recognition
Flexible Model-Based Multi-Corner Detector for Accurate Measurements and Recognition (GO, BH), pp. 578–583.
ICPRICPR-v2-2002-Paletta #classification #using
Detection of Traffic Signs Using Posterior Classifier Combination (LP), pp. 705–708.
ICPRICPR-v2-2002-SatohTWKNY #robust
Robust Event Detection by Radial Reach Filter (RRF) (YS, HT, CW, SK, YN, KY), pp. 623–627.
ICPRICPR-v2-2002-StevensSA #automation #using
Automatic Target Detection Using PMMW and LADAR Imagery (MRS, MS, SA), pp. 647–650.
ICPRICPR-v2-2002-TweedM #analysis #automation
Automatic Detection of Regions of Interest in Mammographies Based on a Combined Analysis of Texture and Histogram (TT, SM), pp. 448–452.
ICPRICPR-v2-2002-UdeA #probability #using
Probabilistic Detection and Tracking at High Frame Rates Using Affine Warping (AU, CGA), pp. 6–9.
ICPRICPR-v2-2002-VisserSL #people #retrieval #semantics #video
Detecting Automobiles and People for Semantic Video Retrieval (RV, NS, MSL), pp. 733–736.
ICPRICPR-v2-2002-WuYSLK #3d
Glasses Frame Detection with 3D Hough Transform (HW, GY, TS, SL, MK), pp. 346–349.
ICPRICPR-v2-2002-XieJ #performance
A New Efficient Ellipse Detection Method (YX, QJ), pp. 957–960.
ICPRICPR-v2-2002-YangP02b #3d #named
CHEF: Convex Hull of Elliptic Features for 3D Blob Detection (QY, BP), pp. 282–285.
ICPRICPR-v3-2002-BruniV
Scratch Detection via Underdamped Harmonic Motion (VB, DV), pp. 887–890.
ICPRICPR-v3-2002-ChabbiTP #automation #image
Automatic Detection of Planar Contours from Uncalibrated Images (HC, LT, SP), pp. 541–544.
ICPRICPR-v3-2002-ChenZL #analysis #component #independence #segmentation
Edge Detection and Texture Segmentation Based on Independent Component Analysis (YWC, XYZ, HL), pp. 351–354.
ICPRICPR-v3-2002-ChoudhuryRPP #learning #network
Boosting and Structure Learning in Dynamic Bayesian Networks for Audio-Visual Speaker Detection (TC, JMR, VP, AP), p. 789–?.
ICPRICPR-v3-2002-DuC #image #video
Thresholding Video Images for Text Detection (EYD, CIC), p. 919–?.
ICPRICPR-v3-2002-FauqueurB #image #query
Coarse Detection and Fine Color Description for Region-Based Image Queries (JF, NB), pp. 1027–1034.
ICPRICPR-v3-2002-GargAH #information management
Fusion of Global and Local Information for Object Detection (AG, SA, TSH), p. 723–?.
ICPRICPR-v3-2002-HsiehYC
Morphology-Based License Plate Detection from Complex Scenes (JWH, SHY, YSC), pp. 176–179.
ICPRICPR-v3-2002-JinQH #probability
A Probabilistic Model for Camera Zoom Detection (RJ, YQ, AGH), pp. 859–862.
ICPRICPR-v3-2002-JungKH #image #sequence
Text Scanner with Text Detection Technology on Image Sequences (KJ, KIK, JH), pp. 473–476.
ICPRICPR-v3-2002-LinB
Discovering Operators and Features for Object Detection (YL, BB), pp. 339–342.
ICPRICPR-v3-2002-MaalmiEBVDG #fault #locality #using
Crack Defect Detection and Localization Using Genetic-Based Inverse Voting Hough Transform (KM, AEO, RB, LFCLYV, AD, PG), pp. 257–260.
ICPRICPR-v3-2002-MaoCLS #hybrid #image #video
Hybrid Chinese/English Text Detection in Images and Video Frames (WM, FLC, KKML, WCS), pp. 1015–1018.
ICPRICPR-v3-2002-MarianoMPKMLDD #algorithm #evaluation #performance
Performance Evaluation of Object Detection Algorithms (VYM, JM, JHP, RK, DM, HL, DSD, TD), pp. 965–969.
ICPRICPR-v3-2002-OkunYP #documentation #image #robust
Robust Text Detection from Binarized Document Images (OO, YY, MP), pp. 61–64.
ICPRICPR-v3-2002-Robinson
Optimal Detection of Blurred Edges (JAR), pp. 831–834.
ICPRICPR-v3-2002-SahbiB #classification
Coarse-to-Fine Support Vector Classifiers for Face Detection (HS, NB), pp. 359–362.
ICPRICPR-v3-2002-Smeraldi #named #parametricity
Ranklets: Orientation Selective Non-Parametric Features Applied to Face Detection (FS), pp. 379–382.
ICPRICPR-v3-2002-SpragueL #image #people
Clothed People Detection in Still Images (NS, JL), pp. 585–589.
ICPRICPR-v3-2002-SugimotoNM #visual notation
Detecting a Gazing Region by Visual Direction and Stereo Cameras (AS, AN, TM), pp. 278–282.
ICPRICPR-v3-2002-ZhangB #multi
A Wavelet-Based Edge Detection Method by Scale Multiplication (LZ, PB), pp. 501–500.
ICPRICPR-v4-2002-DassJL #markov #modelling #random #synthesis #using
Face Detection and Synthesis Using Markov Random Field Models (SCD, AKJ, XL), pp. 201–204.
ICPRICPR-v4-2002-DuricLSW #image #using
Using Normal Flow for Detection and Tracking of Limbs in Color Images (ZD, FL, YS, HW), p. 268–?.
ICPRICPR-v4-2002-FujiyoshiK #multi
Layered Detection for Multiple Overlapping Objects (HF, TK), pp. 156–161.
ICPRICPR-v4-2002-HadidPM #using
Color-Based Face Detection Using Skin Locus Model and Hierarchical Filtering (AH, MP, BM), pp. 196–200.
ICPRICPR-v4-2002-LefaixMB
Motion-Based Obstacle Detection and Tracking for Car Driving Assistance (GL, ÉM, PB), pp. 74–77.
ICPRICPR-v4-2002-MorimotoAF
Detecting Eye Position and Gaze from a Single Camera and 2 Light Sources (CHM, AA, MF), pp. 314–317.
ICPRICPR-v4-2002-XiL #feature model #using
Face Detection and Facial Feature Extraction Using Support Vector Machines (DX, SWL), pp. 209–212.
ICPRICPR-v4-2002-YeungC #network
Parzen-Window Network Intrusion Detectors (DYY, CC), pp. 385–388.
ICPRICPR-v4-2002-ZhuS #adaptation #analysis #feature model #statistics
Discriminant Analysis and Adaptive Wavelet Feature Selection for Statistical Object Detection (YZ, SCS), pp. 86–89.
KDDKDD-2002-JulischD #mining
Mining intrusion detection alarms for actionable knowledge (KJ, MD), pp. 366–375.
KDDKDD-2002-MahoneyC #learning #modelling #network #novel
Learning nonstationary models of normal network traffic for detecting novel attacks (MVM, PKC), pp. 376–385.
KDDKDD-2002-UedaS #category theory #modelling #multi #parametricity #using
Single-shot detection of multiple categories of text using parametric mixture models (NU, KS), pp. 626–631.
KDDKDD-2002-YamanishiT #framework
A unifying framework for detecting outliers and change points from non-stationary time series data (KY, JiT), pp. 676–681.
KDDKDD-2002-YangZCJ #topic
Topic-conditioned novelty detection (YY, JZ, JGC, CJ), pp. 688–693.
SIGIRSIGIR-2002-Smith
Detecting and Browsing Events in Unstructured text (DAS), pp. 73–80.
SIGIRSIGIR-2002-ZhangCM #adaptation
Novelty and redundancy detection in adaptive filtering (YZ, JPC, TPM), pp. 81–88.
AdaEuropeAdaEurope-2002-DoudouGG #encapsulation
Encapsulating Failure Detection: From Crash to Byzantine Failures (AD, BG, RG), pp. 24–50.
PLDIPLDI-2002-ChoiLLOSS #concurrent #object-oriented #parallel #performance #precise #source code #thread
Efficient and Precise Datarace Detection for Multithreaded Object-Oriented Programs (JDC, KL, AL, RO, VS, MS), pp. 258–269.
SASSAS-2002-MesnardPN #logic programming #source code #termination
Detecting Optimal Termination Conditions of Logic Programs (FM, ÉP, UN), pp. 509–526.
ICSEICSE-2002-HangalL #automation #debugging #using
Tracking down software bugs using automatic anomaly detection (SH, MSL), pp. 291–301.
ICSEICSE-2002-HausmannHT #approach #case study #functional #graph transformation #requirements #static analysis
Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
ICSEICSE-2002-Raz #research #semantics #specification
Research abstract for semantic detection in dynamic data feeds with incomplete specifications (OR), pp. 733–734.
ICSEICSE-2002-RazKS #data flow #online #semantics
Semantic anomaly detection in online data sources (OR, PK, MS), pp. 302–312.
SACSAC-2002-KrugelTK #network
Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.
SACSAC-2002-PerezCRT #algorithm #interactive #multi
An enablement detection algorithm for open multiparty interactions (JAP, RC, DR, MT), pp. 378–384.
SACSAC-2002-SeleznyovM #learning
Learning temporal patterns for anomaly intrusion detection (AS, OM), pp. 209–213.
GPCEGPCE-2002-DouenceFS #framework #interactive
A Framework for the Detection and Resolution of Aspect Interactions (RD, PF, MS), pp. 173–188.
ASPLOSASPLOS-2002-ButtsS
Dynamic dead-instruction detection and elimination (JAB, GSS), pp. 199–210.
DACDAC-2002-BhuniaRS #analysis #fault #locality #novel
A novel wavelet transform based transient current analysis for fault detection and localization (SB, KR, JS), pp. 361–366.
DACDAC-2002-Higuchi #multi #scalability
An implication-based method to detect multi-cycle paths in large sequential circuits (HH), pp. 164–169.
DATEDATE-2002-BhuniaR #analysis #fault #using
Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
DATEDATE-2002-KhomenkoKY #integer #programming #using
Detecting State Coding Conflicts in STGs Using Integer Programming (VK, MK, AY), pp. 338–345.
DATEDATE-2002-LechugaMMB #fault
Built-In Dynamic Current Sensor for Hard-to-Detect Faults in Mixed-Signal Ics (YL, RM, MM, SB), pp. 205–211.
DATEDATE-2002-LeeCDGM #algorithm #fault #multi #testing
A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults (SL, BC, JD, MRG, MRM), pp. 94–99.
DATEDATE-2002-Leveugle #automation #fault
Automatic Modifications of High Level VHDL Descriptions for Fault Detection or Tolerance (RL), pp. 837–841.
PDPPDP-2002-LarreaFA #consistency
Eventually Consistent Failure Detectors (ML, AF, SA), pp. 91–98.
PDPPDP-2002-LarreaFA02a #implementation #on the
On the Impossibility of Implementing Perpetual Failure Detectors in Partially Synchronous Systems (ML, AF, SA), p. 99–?.
PDPPDP-2002-Le #concurrent #distributed #performance
Fast Detection and Resolution of Generalized Distributed Deadlock (SL), pp. 429–436.
FoSSaCSFoSSaCS-2002-KochMP #data access #policy #specification
Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
ICLPICLP-2002-Christensen #logic programming #pervasive #process #using
Using Logic Programming to Detect Activities in Pervasive Healthcare (HBC), pp. 421–436.
ICTSSTestCom-2002-CavalliPY #communication #component #fault
Fault Detection within a Component of a System of Communicating FSMs (ARC, SP, NY), p. 317–?.
WICSAWICSA-2001-BernardoCD #algebra #architecture #process
Detecting Architectural Mismatches in Process Algebraic Descriptions of Software Systems (MB, PC, LD), pp. 77–86.
TPDLECDL-2001-ZaslavskyBM #algorithm #comparison #multi #using
Using Copy-Detection and Text Comparison Algorithms for Cross-Referencing Multiple Editions of Literary Works (ABZ, AB, KM), pp. 103–114.
ICDARICDAR-2001-CrandallK #robust #video
Robust Detection of Stylized Text Events in Digital Video (DJC, RK), pp. 865–871.
ICDARICDAR-2001-FeldbachT #segmentation
Line Detection and Segmentation in Historical Church Registers (MF, KDT), pp. 743–747.
ICDARICDAR-2001-HuangTSX #documentation #image #similarity
Vertical Bar Detection for Gauging Text Similarity of Document Images (WH, CLT, SYS, YX), pp. 640–644.
ICDARICDAR-2001-HuaWZ #automation #evaluation #performance #video
Automatic Performance Evaluation for Video Text Detection (XSH, LW, HZ), pp. 545–550.
ICDARICDAR-2001-LooT #word
Detection of Word Groups Based on Irregular Pyramid (PKL, CLT), pp. 200–204.
ICDARICDAR-2001-PalMC #documentation #multi
Multi-Skew Detection of Indian Script Documents (UP, MM, BBC), pp. 292–296.
ICDARICDAR-2001-PietikainenO #documentation #image
Edge-Based Method for Text Detection from Complex Document Images (MP, OO), pp. 286–291.
ICDARICDAR-2001-Yan #algorithm #fuzzy
Detection of Curved Text Path Based on the Fuzzy Curve-Tracing (FCT) Algorithm (HY), pp. 266–270.
ICDARICDAR-2001-ZhengLDP
Form Frame Line Detection with Directional Single-Connected Chain (YZ, CL, XD, SP), pp. 699–703.
ITiCSEITiCSE-2001-LancasterC #fault #process #towards
Towards an error free plagarism detection process (TL, FC), pp. 57–60.
IWPCIWPC-J-1999-MartinoMMV01 #communication #interactive #parallel #program analysis
Parallel program analysis and restructuring by detection of point-to-point interaction patterns and their transformation into collective communication constructs (BDM, AM, NM, UV), pp. 235–263.
CSMRCSMR-2001-FioravantiN #case study #object-oriented
A Study on Fault-Proneness Detection of Object-Oriented Systems (FF, PN), pp. 121–130.
CSMRCSMR-2001-Villavicencion #automation #program analysis #programming #slicing
Program Analysis for the Automatic Detection of Programming Plans Applying Slicing (GV), pp. 188–191.
ICSMEICSM-2001-MalenfantAMD #analysis
Flow Analysis to Detect Blocked Statements (BM, GA, EM, MD), p. 62–?.
PASTEPASTE-2001-FlanaganF #scalability #source code
Detecting race conditions in large programs (CF, SNF), pp. 90–96.
SCAMSCAM-2001-ChenXY #concurrent #source code
Detecting Dead Statements for Concurrent Programs (ZC, BX, HY), pp. 67–74.
SCAMSCAM-2001-WeberSR #case study #constraints #optimisation #security #using
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
ICMLICML-2001-MarxDB #clustering
Coupled Clustering: a Method for Detecting Structural Correspondence (ZM, ID, JMB), pp. 353–360.
KDDKDD-2001-HotzGHNW #analysis #industrial
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive industry (EH, UG, WH, GN, MW), pp. 432–437.
KDDKDD-2001-ShekharLZ #algorithm #graph #summary
Detecting graph-based spatial outliers: algorithms and applications (a summary of results) (SS, CTL, PZ), pp. 371–376.
MLDMMLDM-2001-ImiyaI #statistics
Statistics of Flow Vectors and Its Application to the Voting Method for the Detection of Flow Fields (AI, KI), pp. 293–306.
MLDMMLDM-2001-JangKC #fuzzy
FAM-Based Fuzzy Inference for Detecting Shot Transitions (SWJ, GYK, HIC), pp. 52–61.
MLDMMLDM-2001-PhamWS #classification #network
Face Detection by Aggregated Bayesian Network Classifiers (TVP, MW, AWMS), pp. 249–262.
SEKESEKE-2001-HoudekSE #empirical #execution #fault #specification
Defect Detection for Executable Specifications — An Experiment (FH, TS, DE), pp. 10–18.
SEKESEKE-2001-MorenoS #classification #requirements
A Method for Detection, Classification and Resolution of Discrepancies in Viewpoint-based Requirements Engineering (AMM, AS), pp. 110–119.
SIGIRSIGIR-2001-StokesC #classification #documentation #semantics
Combining Semantic and Syntactic Document Classifiers to Improve First Story Detection (NS, JC), pp. 424–425.
ECOOPECOOP-2001-HirzelDH #garbage collection #liveness #on the
On the Usefulness of Liveness for Garbage Collection and Leak Detection (MH, AD, ALH), pp. 181–206.
OOPSLAOOPSLA-2001-PraunG #concurrent
Object Race Detection (CvP, TRG), pp. 70–82.
TOOLSTOOLS-USA-2001-GueheneucA #constraints #design pattern #fault #using
Using Design Patterns and Constraints to Automate the Detection and Correction of Inter-Class Design Defects (YGG, HAA), pp. 296–306.
TOOLSTOOLS-USA-2001-Marinescu #design #metric #object-oriented
Detecting Design Flaws via Metrics in Object-Oriented Systems (RM), pp. 173–182.
AdaEuropeAdaEurope-2001-ChenL #effectiveness #empirical #evaluation #fault #reduction #testing
Test Suite Reduction and Fault Detecting Effectiveness: An Empirical Evaluation (TYC, MFL), pp. 253–265.
AdaSIGAda-2001-ChenBY #adaptation #algorithm #using
Detecting concurrently executed pairs of statements using an adapted MHP algorithm (ZC, BX, HY), pp. 107–114.
RERE-2001-Feather #fault #reduction #using
Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
ASEASE-2001-Albin-AmiotCGJ #design pattern
Instantiating and Detecting Design Patterns: Putting Bits and Pieces Together (HAA, PC, YGG, NJ), pp. 166–173.
FSEESEC-FSE-2001-KavehE #concurrent #object-oriented
Deadlock detection in distribution object systems (NK, WE), pp. 44–51.
FSEESEC-FSE-2001-UchitelKM #sequence chart #specification
Detecting implied scenarios in message sequence chart specifications (SU, JK, JM), pp. 74–82.
SACSAC-2001-AngelopoulosYPL #on the #video
On motion and noise detection in digital video (AA, EAY, AP, TL), pp. 309–311.
SACSAC-2001-HwangR #algorithm #fault
Algorithms to detect chained-inference faults in information distribution systems (YPH, DCR), pp. 679–685.
SACSAC-2001-VuHT #algorithm #image #performance #query
An efficient core-area detection algorithm for fast noise-free image query processing (KV, KAH, DAT), pp. 258–263.
DACDAC-2001-GuptaGYA #image #satisfiability
Dynamic Detection and Removal of Inactive Clauses in SAT with Application in Image Computation (AG, AG, ZY, PA), pp. 536–541.
DACDAC-2001-KarriWMK #concurrent #fault #symmetry
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers (RK, KW, PM, YK), pp. 579–585.
DACDAC-2001-KjeldsbergCA #data-driven #estimation
Detection of Partially Simultaneously Alive Signals in Storage Requirement Estimation for Data Intensive Applications (PGK, FC, EJA), pp. 365–370.
DACDAC-2001-LeeNCKD #2d
Two-Dimensional Position Detection System with MEMS Accelerometer for MOUSE Applications (SL, GJN, JC, HK, AJD), pp. 852–857.
DACDAC-2001-Qu #component
Publicly Detectable Techniques for the Protection of Virtual Components (GQ), pp. 474–479.
DACDAC-2001-RaahemifarA #fault
Fault Characterizations and Design-for-Testability Technique for Detecting IDDQ Faults in CMOS/BiCMOS Circuits (KR, MA), pp. 313–316.
DATEDATE-2001-FavalliM #fault #optimisation
Optimization of error detecting codes for the detection of crosstalk originated errors (MF, CM), pp. 290–296.
DATEDATE-2001-HashizumeIYT #fault
CMOS open defect detection by supply current test (MH, MI, HY, TT), p. 509.
DATEDATE-2001-PomeranzR01a #effectiveness #fault #generative #testing
Definitions of the numbers of detections of target faults and their effectiveness in guiding test generation for high defect coverage (IP, SMR), pp. 504–508.
TACASTACAS-2001-FislerFVY #algorithm #question
Is There a Best Symbolic Cycle-Detection Algorithm? (KF, RF, GK, MYV, ZY), pp. 420–434.
IJCARIJCAR-2001-ReifST #specification
Flaw Detection in Formal Specifications (WR, GS, AT), pp. 642–657.
ADLADL-2000-AdamACM #documentation
Detecting Data and Schema Changes in Scientific Documents (NRA, IA, TC, RM), pp. 160–170.
ADLADL-2000-CampbellCS #documentation
Copy Detection Systems for Digital Documents (DMC, WRC, RDS), pp. 78–88.
DL-2000-MonostoriZS #distributed #documentation #library
Document overlap detection system for distributed digital libraries (KM, ABZ, HWS), pp. 226–227.
TPDLECDL-2000-AmaralT #documentation #topic
Topic Detection in Read Documents (RA, IT), pp. 315–318.
TPDLECDL-2000-RauberDM #approach #automation #documentation #network #topic
Automatically Detecting and Organizing Documents into Topic Hierarchies: A Neural Network Based Approach to Bookshelf Creation and Arrangement (AR, MD, DM), pp. 348–351.
IWPCIWPC-2000-GirardW #approach #classification #data type
Evaluating the Accessor Classification Approach to Detect Abstract Data Types (JFG, MW), pp. 87–95.
WLCWLC-2000-Konstantinidis
Error-Detecting Properties of Languages (SK), pp. 240–252.
CIKMCIKM-2000-AllanLJ
First Story Detection In TDT Is Hard (JA, VL, HJ), pp. 374–381.
CIKMCIKM-2000-LiuPT #delivery #named #web
WebCQ: Detecting and Delivering Information Changes on the Web (LL, CP, WT), pp. 512–519.
ICMLICML-2000-Eskin #probability #semistructured data #using
Anomaly Detection over Noisy Data using Learned Probability Distributions (EE), pp. 255–262.
ICMLICML-2000-KlinkenbergJ #concept
Detecting Concept Drift with Support Vector Machines (RK, TJ), pp. 487–494.
ICMLICML-2000-Towell
Local Expert Autoassociators for Anomaly Detection (GGT), pp. 1023–1030.
ICPRICPR-v1-2000-BesshoIY #using
Detecting Human Face and Recognizing Facial Expressions Using Potential Net (HB, YI, MY), pp. 5076–5079.
ICPRICPR-v1-2000-BorgaMK #named
FSED — Feature Selective Edge Detection (MB, HM, HK), pp. 1229–1232.
ICPRICPR-v1-2000-BrandM #assessment #comparative
A Comparative Assessment of Three Approaches to Pixel-Level Human Skin-Detection (JB, JSDM), pp. 5056–5059.
ICPRICPR-v1-2000-ChengDHT #performance
Efficient Detection and Extraction of Color Objects from Complex Scenes (JC, SD, GH, JT), pp. 1668–1671.
ICPRICPR-v1-2000-DuffyCL #using
Object Detection Using Color (ND, JLC, GL), pp. 1700–1703.
ICPRICPR-v1-2000-GolovanYL #image
Pre-Attentive Detection of Perceptually Important Regions in Facial Images (AG, MHY, SWL), pp. 5092–5095.
ICPRICPR-v1-2000-GulsrudH #clustering
Optimal Filter for Detection of Clustered Microcalcifications (TOG, JHH), pp. 1508–1511.
ICPRICPR-v1-2000-KumarSR #realtime #recognition #using
Real Time Detection and Recognition of Human Profiles Using Inexpensive Desktop Cameras (PK, KS, SR), pp. 5096–5099.
ICPRICPR-v1-2000-LiGG
Detecting and Tracking Human Faces in Videos (YL, AAG, ONG), pp. 1807–1810.
ICPRICPR-v1-2000-MachiT #automation #video
Video Shot Detection and Characterization in Semi-Automatic Digital Video Restoration (AM, MT), pp. 1855–1859.
ICPRICPR-v1-2000-MikicCKT
Moving Shadow and Object Detection in Traffic Scenes (IM, PCC, GTK, MMT), pp. 1321–1324.
ICPRICPR-v1-2000-NealS #3d #representation
A Symbolic Representation for 3-D Object Feature Detection (PJN, LGS), pp. 1221–1224.
ICPRICPR-v1-2000-NgoPCZ #representation #video
Motion-Based Video Representation for Scene Change Detection (CWN, TCP, RTC, HZ), pp. 1827–1830.
ICPRICPR-v1-2000-RavyseSCR #composition #process #recognition #using
Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition (IR, HS, JC, MJTR), pp. 5080–5083.
ICPRICPR-v1-2000-ShioyamaWM #cumulative
Object Detection with Gabor Filters and Cumulative Histograms (TS, HW, SM), pp. 1704–1707.
ICPRICPR-v1-2000-SorianoMHL #video
Skin Detection in Video under Changing Illumination Conditions (MS, BM, SH, ML), pp. 1839–1842.
ICPRICPR-v1-2000-VogelhuberS #constraints
Face Detection Based on Generic Local Descriptors and Spatial Constraints (VV, CS), pp. 5084–5087.
ICPRICPR-v1-2000-YoonDD #video
Event Detection from MPEG Video in the Compressed Domain (KY, DD, DSD), pp. 1819–1822.
ICPRICPR-v2-2000-BovisS #using
Detection of Masses in Mammograms Using Texture Features (KB, SS), pp. 2267–2270.
ICPRICPR-v2-2000-BurrellP #algorithm #learning #online #parametricity #probability #process
Sequential Algorithms for Detecting Changes in Acting Stochastic Processes and On-Line Learning of their Operational Parameters (AB, TPK), pp. 2656–2659.
ICPRICPR-v2-2000-CordellaFSV #component #graph #image #performance
Fast Graph Matching for Detecting CAD Image Components (LPC, PF, CS, MV), pp. 6034–6037.
ICPRICPR-v2-2000-DoschMT #recognition
Improving Arc Detection in Graphics Recognition (PD, GM, KT), pp. 2243–2246.
ICPRICPR-v2-2000-GuillaudBRBT #multi #using
Continuity Perception Using a Multiagent System: An Application to Growth Ring Detection on Fish Otoliths (AG, AB, VR, JLB, HT), pp. 2519–2522.
ICPRICPR-v2-2000-GuoDR #using
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties (JKG, DSD, AR), pp. 2355–2358.
ICPRICPR-v2-2000-HickinbothamA
Novelty Detection in Airframe Strain Data (SJH, JA), pp. 2536–2539.
ICPRICPR-v2-2000-JingM
Glasses Detection and Extraction by Deformable Contour (ZJ, RM), pp. 2933–2936.
ICPRICPR-v2-2000-KuritaTHSM #adaptation #estimation #image #performance
Efficient Face Detection from News Images by Adaptive Estimation of Prior Probabilities and Ising Search (TK, MT, KH, HS, TM), pp. 2917–2920.
ICPRICPR-v2-2000-LiD00a #automation #video
A Video Text Detection System Based on Automated Training (HL, DSD), pp. 2223–2228.
ICPRICPR-v2-2000-LiG #network #optimisation
Combining Feature Optimization into Neural Network Based Face Detection (SZL, QG), pp. 2814–2817.
ICPRICPR-v2-2000-LinF #geometry #using
Human Face Detection Using Geometric Triangle Relationship (CL, KCF), pp. 2941–2944.
ICPRICPR-v2-2000-PingLK #float #recognition
A Floating Feature Detector for Handwritten Numeral Recognition (ZP, CL, ACK), pp. 2553–2556.
ICPRICPR-v2-2000-ShenIT #energy
Detecting Reflection Axes by Energy Minimization (DS, HHSI, EKT), pp. 6026–6029.
ICPRICPR-v2-2000-TerrillonMSSA #invariant #orthogonal
Invariant Neural-Network Based Face Detection with Orthogonal Fourier-Mellin Moments (JCT, DM, MS, YS, SA), p. 2993–?.
ICPRICPR-v3-2000-AchardBD #multi
A Sub-Pixel and Multispectral Corner Detector (CA, EB, JD), pp. 3971–3974.
ICPRICPR-v3-2000-BorghysPA #image #multi
A Multi-Variate Contour Detector for High-Resolution Polarimetric SAR Images (DB, CP, MA), pp. 3650–3655.
ICPRICPR-v3-2000-DeschenesZ #image
Detection of Line Junctions in Gray-Level Images (FD, DZ), pp. 3762–3765.
ICPRICPR-v3-2000-FayolleDRC #multi
A Wavelet Based Multiscale Detection Scheme of Feature Points (JF, CD, LR, SC), pp. 3425–3428.
ICPRICPR-v3-2000-Jehan-BessonBA #set #using
Detection and Tracking of Moving Objects using a New Level Set Based Method (SJB, MB, GA), pp. 7112–7117.
ICPRICPR-v3-2000-JohanssonKG #normalisation #symmetry #using
Detecting Rotational Symmetries Using Normalized Convolution (BJ, HK, GHG), pp. 3500–3504.
ICPRICPR-v3-2000-KimCL #feature model #performance #using
Fast Scene Change Detection Using Direct Feature Extraction from MPEG Compressed Videos (YMK, SWC, SWL), pp. 3178–3181.
ICPRICPR-v3-2000-LeiHR #image #low level
Detecting Generic Low-Level Features in Images (BJL, EAH, MJTR), pp. 3979–3982.
ICPRICPR-v3-2000-LiK #ambiguity #analysis
Detection of Cognitive Binding During Ambiguous Figure Tasks by Wavelet Coherence Analysis of EEG Signals (THL, WRK), pp. 3098–3101.
ICPRICPR-v3-2000-LiuH00a #implementation
Two Practical Issues in Canny’s Edge Detector Implementation (GL, RMH), pp. 3680–3682.
ICPRICPR-v3-2000-LuTH #estimation #novel #robust
A Novel Method for Camera Planar Motion Detection and Robust Estimation of the 1D Trifocal Tensor (LL, HTT, ZH), pp. 3815–3818.
ICPRICPR-v3-2000-MajchrzakSSM #image
Motion Detection from Temporally Integrated Images (DM, SS, BS, RRM), pp. 3844–3847.
ICPRICPR-v3-2000-MurakamiN
High Speed Line Detection by Hough Transform in Local Area (KM, TN), pp. 3471–3474.
ICPRICPR-v3-2000-OrriolsTBRVV #approach #modelling #probability #using
Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models (XO, RT, XB, PR, JV, JJV), pp. 7018–7021.
ICPRICPR-v3-2000-PorterMT #correlation #using #video
Video Cut Detection using Frequency Domain Correlation (SVP, MM, BTT), pp. 3413–3416.
ICPRICPR-v3-2000-RittscherS #bound
An Integral Criterion for Detecting Boundary Edges and Textured Regions (JR, JS), pp. 7076–7079.
ICPRICPR-v3-2000-ShenIT00b #robust #symmetry
Robust Detection of Skewed Symmetries (DS, HHSI, EKT), pp. 7022–7025.
ICPRICPR-v3-2000-SugiyamaA #reliability
Edge Detection Method Based on Edge Reliability with Fixed Thresholds: Consideration of Uniformity and Gradation (TS, KA), pp. 3660–3663.
ICPRICPR-v3-2000-TodtT #multi
Detection of Natural Landmarks through Multiscale Opponent Features (ET, CT), pp. 3988–3991.
ICPRICPR-v3-2000-VriesV #3d #adaptation #classification #estimation #image
Scale-Adaptive Landmark Detection, Classification and Size Estimation in 3D Object-Background Images (RGdV, PWV), pp. 7026–7029.
ICPRICPR-v3-2000-WangB #energy #modelling #segmentation
Detection and Segmentation of Generic Shapes Based on Vectorial Affine Modeling of Energy in Eigenspace (ZW, JBA), pp. 3983–3987.
ICPRICPR-v3-2000-YamanaSA #image #reliability #using
Edge Plane Detection in Spatio-Temporal Images by Using Edge Vector and Edge Reliability (FY, TS, KA), pp. 3664–3667.
ICPRICPR-v3-2000-Ziou
Optimal Line Detector (DZ), pp. 3534–3537.
ICPRICPR-v4-2000-BodnarovaBL #using
Textile Flaw Detection Using Optimal Gabor Filters (AB, MB, SJL), pp. 4799–4802.
ICPRICPR-v4-2000-BolterL #re-engineering
Detection and Reconstruction of Human Scale Features from High Resolution Interferometric SAR Data (RB, FL), pp. 4291–4294.
ICPRICPR-v4-2000-Duta #image
Road Detection in Panchromatic SPOT Satellite Images (ND), pp. 4308–4311.
ICPRICPR-v4-2000-GutierrezEVF #automation
An Active Contour Model for the Automatic Detection of the Fovea in Fluorescein Angiographies (JG, IE, EdV, FJF), pp. 4312–4315.
ICPRICPR-v4-2000-HealeyP #named
SmartCar: Detecting Driver Stress (JH, RWP), pp. 4218–4221.
ICPRICPR-v4-2000-HuangM #precise
Face Detection and Precise Eyes Location (WH, RM), pp. 4722–4727.
ICPRICPR-v4-2000-JabriDWR #adaptation #image #people #using #video
Detection and Location of People in Video Images Using Adaptive Fusion of Color and Edge Information (SJ, ZD, HW, AR), pp. 4627–4631.
ICPRICPR-v4-2000-KopilovicVS #analysis #lens
Application of Panoramic Annular Lens for Motion Analysis Tasks: Surveillance and Smoke Detection (IK, BV, TS), pp. 4714–4717.
ICPRICPR-v4-2000-LeungCKC #bound #fuzzy
Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
ICPRICPR-v4-2000-LilienblumMAC
Dent Detection in Car Bodies (TL, BM, PA, RC), pp. 4775–4778.
ICPRICPR-v4-2000-MamicB #automation #using
Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
ICPRICPR-v4-2000-MataNS #multi #using
Microcalcifications Detection Using Multiresolution Methods (RM, EN, FS), pp. 4344–4347.
ICPRICPR-v4-2000-NakajimaIPP #correlation #invariant #recognition
Object Recognition and Detection by a Combination of Support Vector Machine and Rotation Invariant Phase Only Correlation (CN, NI, MP, TP), pp. 4787–4790.
ICPRICPR-v4-2000-NewmanY
Compound Extraction and Fitting Method for Detecting Cardiac Ventricle in SPECT Data (TSN, HY), pp. 4328–4331.
ICPRICPR-v4-2000-OhyamaWKTS #automation
Automatic Left Ventricular Endocardium Detection in Echocardiograms Based on Ternary Thresholding Method (WO, TW, FK, ST, KS), pp. 4320–4323.
ICPRICPR-v4-2000-PuigTN #navigation
Features Detection and Navigation on Neurovascular Trees (AP, DT, IN), pp. 4076–4079.
ICPRICPR-v4-2000-TerrillonSSFA #invariant
Invariant Face Detection with Support Vector Machines (JCT, MNS, MS, HF, SA), pp. 4210–4217.
ICPRICPR-v4-2000-ThaibaouiRB #approach #fuzzy #image #logic
A Fuzzy Logic Approach to Drusen Detection in Retinal Angiographic Images (AT, AR, PB), pp. 4748–4751.
KDDKDD-2000-PenaFL #behaviour #data mining #mining
Data mining to detect abnormal behavior in aerospace data (JMP, FF, SL), pp. 390–397.
KDDKDD-2000-RaghavanBS #predict #process #using
Defection detection: using activity profiles to predict ISP customer vulnerability (NR, RMB, MS), pp. 506–515.
KDDKDD-2000-Senator #case study #information management #scalability
Ongoing management and application of discovered knowledge in a large regulatory organization: a case study of the use and impact of NASD Regulation’s Advanced Detection System (RADS) (TES), pp. 44–53.
KDDKDD-2000-YamanishiTWM #algorithm #finite #learning #online #using
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms (KY, JiT, GJW, PM), pp. 320–324.
SIGIRSIGIR-2000-McCarleyF #fault #recognition #speech #topic
Influence of speech recognition errors on topic detection (JSM, MF), pp. 342–344.
SIGIRSIGIR-2000-StokesHC #online #semantics
Lexical semantic relatedness and online new event detection (NS, PH, JC), pp. 324–325.
TOOLSTOOLS-PACIFIC-2000-SkevoulisJ #fault #invariant #java #runtime #source code #static analysis
Generic Invariant-Based Static Analysis Tool for Detection of Runtime Errors in Java Programs (SS, XJ), pp. 36–44.
AdaEuropeAdaEurope-2000-BliebergerBS #ada #analysis #data flow #source code
Symbolic Data Flow Analysis for Detecting Deadlocks in Ada Tasking Programs (JB, BB, BS), pp. 225–237.
PEPMPEPM-2000-ScholzBF #analysis #memory management #pointer
Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
PLDIPLDI-2000-FlanaganF #concurrent #java #type system
Type-based race detection for Java (CF, SNF), pp. 219–232.
ASEASE-2000-MalpohlHT
Renaming Detection (GM, JJH, WFT), pp. 73–80.
ICSEICSE-2000-ErnstCGN #invariant
Quickly detecting relevant program invariants (MDE, AC, WGG, DN), pp. 449–458.
ICSEICSE-2000-LippertL #aspect-oriented #case study #exception #programming #using
A study on exception detecton and handling using aspect-oriented programming (ML, CVL), pp. 418–427.
SACSAC-2000-FeekinC #sorting #using
Duplicate Detection Using K-way Sorting Method (AF, ZC), pp. 323–327.
SACSAC-2000-KohleM
Analyzing Human Gait Patterns for Malfunction Detection (MK, DM), pp. 41–45.
SACSAC-2000-RiveroDL #network #static analysis #strict
Static Detection of Sources of Dynamic Anomalies in a Network of Referential Integrity Restrictions (LCR, JHD, DL), pp. 333–339.
DACDAC-2000-ChangCSM #functional #performance #symmetry #using
Fast post-placement rewiring using easily detectable functional symmetries (CWJC, CKC, PS, MMS), pp. 286–289.
DACDAC-2000-LachMP #debugging #fault #locality #performance
Efficient error detection, localization, and correction for FPGA-based debugging (JL, WHMS, MP), pp. 207–212.
DATEDATE-2000-AnghelN #evaluation #fault #reduction
Cost Reduction and Evaluation of a Temporary Faults Detecting Technique (LA, MN), pp. 591–598.
DATEDATE-2000-CarlettaPN #analysis #fault #using
Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
DATEDATE-2000-ParkK #bound #design #fault
A New IEEE 1149.1 Boundary Scan Design for the Detection of Delay Defects (SP, TK), pp. 458–462.
DATEDATE-2000-VardanianM #concurrent #fault
Improving the Error Detection Ability of Concurrent Checkers by Observation Point Insertion in the Circuit Under Check (VAV, LBM), p. 762.
DATEDATE-2000-WeilerMHH #using
Detection of Defective Sensor Elements Using Sigma-Delta-Modulation and a Matched Filter (DW, OM, DH, BJH), pp. 599–603.
CAVCAV-2000-AlfaroHM #fault
Detecting Errors Before Reaching Them (LdA, TAH, FYCM), pp. 186–201.
CAVCAV-2000-StollerUL #distributed #partial order #performance #using
Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods (SDS, LU, YAL), pp. 264–279.
ICTSSTestCom-2000-CavalliPY #communication #fault #power of #testing
Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs (ARC, SP, NY), p. 35–?.
ICDARICDAR-1999-ArikiMT
Telop and Flip Frame Detection and Character Extraction from TV News Articles (YA, KM, ST), pp. 701–704.
ICDARICDAR-1999-ChenD #algorithm #documentation #image #robust
A Robust Skew Detection Algorithm for Grayscale Document Image (MC, XD), pp. 617–620.
ICDARICDAR-1999-GargiCAGKK #automation #video
A System for Automatic Text Detection in Video (UG, DJC, SA, TG, RK, RK), pp. 29–32.
ICDARICDAR-1999-HebertPG #incremental #learning #using
Cursive Character Detection using Incremental Learning (JFH, MP, NG), pp. 808–811.
ICDARICDAR-1999-JiangBW #clustering #documentation #image #nearest neighbour
Skew Detection of Document Images by Focused Nearest-Neighbor Clustering (XJ, HB, DWK), pp. 629–632.
ICDARICDAR-1999-LeeH #documentation
Duplicate Detection in Symbolically Compressed Documents (DSL, JJH), pp. 305–308.
ICDARICDAR-1999-LehalD #documentation
A Range Free Skew Detection Technique for Digitized Gurmukhi Script Documents (GSL, RD), pp. 147–152.
ICDARICDAR-1999-LladosML #diagrams
A Hough-based Method for Hatched Pattern Detection in Maps and Diagrams (JL, EM, JLK), pp. 479–482.
ICDARICDAR-1999-Lopresti #algorithm #documentation #modelling
Models and Algorithms for Duplicate Document Detection (DPL), pp. 297–300.
ICDARICDAR-1999-SteinherzIR #analysis #component
Skew Detection via Principal Components Analysis (TS, NI, ER), pp. 153–156.
ICSMEICSM-1999-DucasseRD #approach #independence
A Language Independent Approach for Detecting Duplicated Code (SD, MR, SD), pp. 109–118.
FMFM-v1-1999-Bousquet #case study #experience #feature model #interactive #model checking #testing #using
Feature Interaction Detection Using Testing and Model-Checking Experience Report (LdB), pp. 622–641.
FMFM-v1-1999-ReffelE #fault #model checking
Error Detection with Directed Symbolic Model Checking (FR, SE), pp. 195–211.
FMFM-v2-1999-Eschbach #algorithm #specification #termination #verification
A Termination Detection Algorithm: Specification and Verification (RE), pp. 1720–1737.
TLCATLCA-1999-Damiani #algebra #data type
Useless-Code Detection and Elimination for PCF with Algebraic Data types (FD), pp. 83–97.
HCIHCI-EI-1999-Burov #approach
Psychophysiological effect of the information technologies on users and a psychophysiological approach for its detection (AB), pp. 120–123.
ICEISICEIS-1999-StefanoV #image
Vehicle Detection in Traffic Images (LdS, EV), pp. 308–313.
CIKMCIKM-1999-LanquillonR #adaptation #information management
Adaptive Information Filtering: Detecting Changes in Text Streams (CL, IR), pp. 538–544.
ICMLICML-1999-HuSK #sequence
Detecting Motifs from Sequences (YJH, SBS, DFK), pp. 181–190.
KDDKDD-1999-BayP #category theory #data mining #mining #set
Detecting Change in Categorical Data: Mining Contrast Sets (SDB, MJP), pp. 302–306.
KDDKDD-1999-BonchiGMP #classification
A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection (FB, FG, GM, DP), pp. 175–184.
KDDKDD-1999-GuralnikS
Event Detection from Time Series Data (VG, JS), pp. 33–42.
KDDKDD-1999-LeeSM #data flow #experience #mining #network
Mining in a Data-Flow Environment: Experience in Network Intrusion Detection (WL, SJS, KWM), pp. 114–124.
OOPSLAOOPSLA-1999-TravassosSFB #design #fault #object-oriented #quality #using
Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality (GT, FS, MF, VRB), pp. 47–56.
TOOLSTOOLS-USA-1999-Ciupke #automation #design #object-oriented #problem #re-engineering
Automatic Detection of Design Problems in Object-Oriented Reengineering (OC), pp. 18–32.
TOOLSTOOLS-USA-1999-MeziniPDB #evolution #java
Detecting Evolution Incompatibilities by Analyzing Java Binaries (MM, JUP, TD, WB), pp. 126–135.
SASSAS-1999-RuthingKS #performance #precise
Detecting Equalities of Variables: Combining Efficiency with Precision (OR, JK, BS), pp. 232–247.
ASEASE-1999-EgyedG #automation #component #development #modelling
Automatically Detecting Mismatches During Component-based and Model-based Development (AE, CG), pp. 191–198.
ASEASE-1999-MiceliSG #design #metric
A Metric Based Technique for Design Flaws Detection and Correction (TM, HAS, RG), pp. 307–310.
ICSEICSE-1999-Ernst #invariant #research #summary
Research Summary for Dynamic Detection of Program Invariants (MDE), pp. 718–719.
SACSAC-1999-ArakiIK
Detection and Correction of Mutually Interfered Erroneous Characters in Japanese Texts (TA, SI, YK), pp. 36–40.
DACDAC-1999-RaimiA
Detecting False Timing Paths: Experiments on PowerPC Microprocessors (RR, JAA), pp. 737–741.
DATEDATE-1999-RayaneVN #embedded
A One-Bit-Signature BIST for Embedded Operational Amplifiers in Mixed-Signal Circuits Based on the Slew-Rate Detection (IR, JVM, MN), p. 792–?.
HPCAHPCA-1999-MartinezLD #concurrent #performance
Impact of Buffer Size on the Efficiency of Deadlock Detection (JMM, PL, JD), pp. 315–318.
HPDCHPDC-1999-HuST #adaptation
Adaptive Write Detection in Home-based Software DSMs (WH, WS, ZT), pp. 353–354.
PDPPDP-1999-HollingworthST #design #parallel #using
Design of highly parallel edge detection nodes using evolutionary techniques (GH, SLS, AMT), pp. 35–42.
ADLADL-1998-HauptmannW #segmentation #video
Story Segmentation and Detection of Commercials in Broadcast News Video (AGH, MJW), pp. 168–179.
ICSMEICSM-1998-BaxterYMSB #abstract syntax tree #clone detection #syntax #using
Clone Detection Using Abstract Syntax Trees (IDB, AY, LMdM, MS, LB), pp. 368–377.
ICSMEICSM-1998-GallHJ #logic
Detection of Logical Coupling Based on Product Release History (HG, KH, MJ), pp. 190–197.
ICSMEICSM-1998-RothermelHOH #empirical #fault #testing
An Empirical Study of the Effects of Minimization on the Fault Detection Capabilities of Test Suites (GR, MJH, JO, CH), pp. 34–43.
IWPCIWPC-1998-MartinoMMV #automation #development #interactive #parallel #program analysis
Automatic Detection of Interaction Patterns for Parallel Program Analysis and Development (BDM, AM, NM, UV), pp. 206–213.
PASTEPASTE-1998-DorRS #analysis #experience #fault #memory management #pointer
Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
CIKMCIKM-1998-PalopoliSU #automation #database
An Automatic Techniques for Detecting Type Conflicts in Database Schemes (LP, DS, DU), pp. 306–313.
ICPRICPR-1998-BabaguchiJ
Event detection from continuous media (NB, RJ), pp. 1209–1212.
ICPRICPR-1998-BoccignoneCP #using
Small target detection using wavelets (GB, AC, AP), pp. 1776–1778.
ICPRICPR-1998-ChaudhuriG #automation #documentation #image #word
Automatic detection of italic, bold and all-capital words in document images (BBC, UG), pp. 610–612.
ICPRICPR-1998-CheungI #symmetry #using
Symmetry detection using complex moments (KKTC, HHSI), pp. 1473–1475.
ICPRICPR-1998-ColmenarezH #fault
Pattern detection with information-based maximum discrimination and error bootstrapping (AC, TSH), pp. 222–224.
ICPRICPR-1998-CutlerD #analysis
View-based detection and analysis of periodic motion (RC, LSD), pp. 495–500.
ICPRICPR-1998-GotoA #framework
A framework for detecting and selecting text line candidates of correct orientation (HG, HA), pp. 1074–1076.
ICPRICPR-1998-Heikkila #bound
Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
ICPRICPR-1998-HontaniD #analysis #component #image #multi
Multi-scale image analysis for detection of characteristic component figure shapes and sizes (HH, KD), pp. 1470–1472.
ICPRICPR-1998-HosieVW #behaviour #visual notation
Classifying and detecting group behaviour from visual surveillance data (RH, SV, GAWW), pp. 602–604.
ICPRICPR-1998-HuangSLW #approach #image #robust
A robust approach to face and eyes detection from images with cluttered background (WH, QS, CPL, JKW), pp. 110–113.
ICPRICPR-1998-IketaniNKS
Detecting persons on changing background (AI, AN, YK, YS), pp. 74–76.
ICPRICPR-1998-IshiiMT #image #realtime #using #video
Detection of foreign substances mixed in a plastic bottle of medicinal solution using real-time video image processing (AI, TM, ST), pp. 1646–1650.
ICPRICPR-1998-JiangBAB #image #towards
Towards detection of glasses in facial images (XJ, MB, BA, HB), pp. 1071–1073.
ICPRICPR-1998-KadyrovP #estimation #fault #linear #parametricity
Linear transformation parameter estimation for fault detection (AK, MP), pp. 550–552.
ICPRICPR-1998-KanekoH #using #video
Cut detection technique from MPEG compressed video using likelihood ratio test (TK, OH), pp. 1476–1480.
ICPRICPR-1998-KawaguchiN #algorithm #search-based #using
Ellipse detection using a genetic algorithm (TK, RiN), pp. 141–145.
ICPRICPR-1998-LeeHSL #analysis #automation #bound #parsing #using #video
Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPRICPR-1998-LeiW #novel #symmetry
A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
ICPRICPR-1998-LuoCH #using
Corner detection using vector potential (BL, ADJC, ERH), pp. 1018–1021.
ICPRICPR-1998-MelzerKZ #approach #modelling #parametricity #using
Stroke detection of brush strokes in portrait miniatures using a semi-parametric and a model based approach (TM, PK, EZ), pp. 474–476.
ICPRICPR-1998-MokhtarianS #image #robust
Curvature scale space for robust image corner detection (FM, RS), pp. 1819–1821.
ICPRICPR-1998-MunkeltRHH #3d #image #modelling #video
A model driven 3D image interpretation system applied to person detection in video images (OM, CR, DH, WH), pp. 70–73.
ICPRICPR-1998-OkumuraMKYMTIM #automation #image
Automatic detection of lung cancers in chest CT images by variable N-Quoit filter (TO, TM, JiK, SY, MM, YT, TI, TM), pp. 1671–1673.
ICPRICPR-1998-Onoguchi
Shadow elimination method for moving object detection (KO), pp. 583–587.
ICPRICPR-1998-OrwellBHW
Detecting periodic structure (JO, JFB, JFH, GHW), pp. 714–716.
ICPRICPR-1998-Pinto-EliasS #automation
Automatic facial feature detection and location (RPE, JHSA), pp. 1360–1364.
ICPRICPR-1998-PramadihantoIY #automation #flexibility
A flexible feature matching for automatic face and facial feature points detection (DP, YI, MY), pp. 92–95.
ICPRICPR-1998-ReiterM
Object-detection with a varying number of eigenspace projections (MR, JM), pp. 759–761.
ICPRICPR-1998-RoningR #image
Registration of nevi in successive skin images for early detection of melanoma (JR, MR), pp. 352–357.
ICPRICPR-1998-StofflerS #realtime
An MPEG-processor-based robot vision system for real-time detection of moving objects by a moving observer (NOS, ZS), pp. 477–481.
ICPRICPR-1998-TanakaHMK
Dynamic attention map by Ising model for human face detection (MT, KH, TM, TK), pp. 1044–1046.
ICPRICPR-1998-TangYF
Characterization and detection of edges by Lipschitz exponents and MASW wavelet transform (YYT, LY, LF), pp. 1572–1574.
ICPRICPR-1998-TerrillonDA #image #invariant #using
Detection of human faces in complex scene images by use of a skin color model and of invariant Fourier-Mellin moments (JCT, MD, SA), pp. 1350–1355.
ICPRICPR-1998-ToepferWBN #navigation
Robot navigation by combining central and peripheral optical flow detection on a space-variant map (CT, MW, GB, HN), pp. 1804–1807.
ICPRICPR-1998-TominagaKMK #performance #using
Realization of an efficient line detection by askant glance camera vision system using extended Hough transform (MT, KK, KM, HK), pp. 225–228.
ICPRICPR-1998-WatanabeMM #image #using
Detecting changes of buildings from aerial images using shadow and shading model (SW, KM, NM), pp. 1408–1412.
ICPRICPR-1998-XuS #realtime #using
Rits Eye: a software-based system for real-time face detection and tracking using pan-tilt-zoom controllable camera (GX, TS), pp. 1194–1197.
KDDKDD-1998-ChanS #case study #learning #scalability #towards
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection (PKC, SJS), pp. 164–168.
KDDKDD-1998-DuMouchelS #algorithm #performance #testing
A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities (WD, MS), pp. 189–193.
KDDKDD-1998-EsterFKS #algorithm #database
Algorithms for Characterization and Trend Detection in Spatial Databases (ME, AF, HPK, JS), pp. 44–50.
KDDKDD-1998-LeeSM #mining #modelling
Mining Audit Data to Build Intrusion Detection Models (WL, SJS, KWM), pp. 66–72.
KDDKDD-1998-SteegRW #correlation #higher-order #multi #performance
Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data (EWS, DAR, EW), pp. 112–120.
SIGIRSIGIR-1998-AllanPL #online
On-Line New Event Detection and Tracking (JA, RP, VL), pp. 37–45.
SIGIRSIGIR-1998-YangPC #case study #online
A Study of Retrospective and On-Line Event Detection (YY, TP, JGC), pp. 28–36.
PPDPALP-PLILP-1998-BruynoogheVWD #logic programming #query #source code
Detecting Unsolvable Queries for Definite Logic Programs (MB, HV, DAdW, MD), pp. 118–133.
PPDPALP-PLILP-1998-Refalo #incremental
Approaches to the Incremental Detection of Implicit Equalities with the Revised Simplex Method (PR), pp. 481–496.
ASEASE-1998-GoedickeMP #architecture #consistency #design #evaluation #nondeterminism #on the #performance
On Detecting and Handling Inconsistencies in Integrating Software Architecture Design and Performance Evaluation (MG, TM, CP), pp. 188–191.
ASEASE-1998-LeePL
Detection of Exclusive OR Global Predicates (EL, CP, DL), pp. 213–216.
FSEFSE-1998-CoolW #concurrent
Event-Base Detection of Concurrency (JEC, ALW), pp. 35–45.
FSEFSE-1998-NaumovichA #algorithm #data flow #parallel
A Conservative Data Flow Algorithm for Detecting All Pairs of Statement That May Happen in Parallel (GN, GSA), pp. 24–34.
CCCC-1998-GhiyaHZ #c #parallel #recursion #source code
Detecting Parallelism in C Programs with Recursive Darta Structures (RG, LJH, YZ), pp. 159–173.
DATEDATE-1998-AntolaPS #approach #fault
A Low-Redundancy Approach to Semi-Concurrent Error Detection in Data Paths (AA, VP, MS), pp. 266–272.
DATEDATE-1998-BolchiniSS #analysis #concurrent #fault #network
Fault Analysis in Networks with Concurrent Error Detection Properties (CB, FS, DS), pp. 957–958.
DATEDATE-1998-LindermeirVG #design #fault #metric #parametricity
Analog Test Design with IDD Measurements for the Detection of Parametric and Catastrophic Faults (WML, TJV, HEG), pp. 822–827.
DATEDATE-1998-SawadaYN #logic
Restructuring Logic Representations with Easily Detectable Simple Disjunctive Decompositions (HS, SY, AN), pp. 755–759.
DATEDATE-1998-Velasco-MedinaCN #fault #injection #linear #using
Fault Detection for Linear Analog Circuits Using Current Injection (JVM, TC, MN), pp. 987–988.
HPCAHPCA-1998-LopezMD #concurrent #distributed #network #performance
A Very Efficient Distributed Deadlock Detection Mechanism for Wormhole Networks (PL, JMM, JD), pp. 57–66.
HPCAHPCA-1998-TubellaG #parallel #thread
Control Speculation in Multithreaded Processors through Dynamic Loop Detection (JT, AG), pp. 14–23.
HPDCHPDC-1998-StellingFKLL #distributed #fault
A Fault Detection Service for Wide Area Distributed Computations (PS, ITF, CK, CAL, GvL), pp. 268–278.
STOCSTOC-1998-BeigelBF
NP Might Not Be As Easy As Detecting Unique Solutions (RB, HB, LF), pp. 203–208.
TACASTACAS-1998-AikenFS #logic programming #source code
Detecting Races in Relay Ladder Logic Programs (AA, MF, ZS), pp. 184–200.
CAVCAV-1998-StollerL #distributed #performance
Efficient Symbolic Detection of Global Properties in Distributed Systems (SDS, YAL), pp. 357–368.
ICTSSIWTCS-1998-PetrenkoUC #concurrent #fault #using
Using Partial-Orders for Detecting Faults in Concurrent Systems (AP, AU, VC), pp. 175–190.
ICDARICDAR-1997-DoermannLK #database #documentation #image
The Detection of Duplicates in Document Image Databases (DSD, HL, OEK), pp. 314–318.
ICDARICDAR-1997-GuoDR #random
Local correspondence for detecting random forgeries (JKG, DSD, AR), pp. 319–323.
ICDARICDAR-1997-Ha #database #performance #scalability
Efficient Detection of Abnormalities in Large OCR Databases (TMH), p. 1006–?.
ICDARICDAR-1997-HullC #documentation #equivalence #image #similarity
Document image similarity and equivalence detection (JJH, JFC), pp. 308–313.
SIGMODSIGMOD-1997-ChawatheG
Meaningful Change Detection in Structured Data (SSC, HGM), pp. 26–37.
WCREWCRE-1997-GirardKS #architecture #comparison #comprehension #data type #encapsulation
Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding (JFG, RK, GS), pp. 66–75.
WCREWCRE-1997-Kontogiannis #evaluation #metric #programming #using
Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics (KK), p. 44–?.
ICSMEICSM-2000-LaguePMMH #clone detection #development #process
Assessing the Benefits of Incorporating Function Clone Detection in a Development Process (BL, DP, JM, EM, JPH), pp. 314–321.
HCIHCI-SEC-1997-KondoSYN #concept #difference #information management #interactive #interface
Interactive Interfaces to Detect Conceptual Difference for Knowledge Acquisition (TK, NS, TY, SN), pp. 303–306.
ICMLICML-1997-AskerM #case study #classification #re-engineering
Feature Engineering and Classifier Selection: A Case Study in Venusian Volcano Detection (LA, RM), pp. 3–11.
KDDKDD-1997-EsterKSX #database #set
Density-Connected Sets and their Application for Trend Detection in Spatial Databases (ME, HPK, JS, XX), pp. 10–15.
KDDKDD-1997-SmythGIRF #clustering #using
Detecting Atmospheric Regimes Using Cross-Validated Clustering (PS, MG, KI, JR, AF), pp. 61–66.
ASEASE-1997-GirardKS #approach #data type
A Metric-based Approach to Detect Abstract Data Types and State Encapsulations (JFG, RK, GS), pp. 82–89.
ESECESEC-FSE-1997-ChenGK #analysis #c++ #reachability
A C++ Data Model Supporting Reachability Analysis and Dead Code Detection (YFC, ERG, EK), pp. 414–431.
ESECESEC-FSE-1997-LandSJ #design #empirical #fault #performance #using #validation
Validating the Defect Detection Performance Advantage of Group Designs for Software Reviews: Report of a Laboratory Experiment Using Program Code (LPWL, CS, DRJ), pp. 294–309.
ESECESEC-FSE-1997-WoodRBM #empirical #fault
Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study (MW, MR, AB, JM), pp. 262–277.
SACSAC-1997-SiLL #documentation #named
CHECK: a document plagiarism detection system (AS, HVL, RWHL), pp. 70–77.
DACDAC-1997-KukimotoB #analysis
Exact Required Time Analysis via False Path Detection (YK, RKB), pp. 220–225.
PDPPDP-1997-JellyMRSC #analysis #concurrent
Detecting deadlock with client-server analysis (IJ, MM, SR, CS, PRC), pp. 351–357.
SOSPSOSP-1997-SavageABNS #concurrent #multi #named #source code #thread
Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs (SS, MB, GN, PS, TEA), pp. 27–37.
TACASTACAS-1997-Ben-AbdallahL #process #sequence chart
Syntactic Detection of Process Divergence and Non-local Choice inMessage Sequence Charts (HBA, SL), pp. 259–274.
CAVCAV-1997-BeerBER #performance
Efficient Detection of Vacuity in ACTL Formulaas (IB, SBD, CE, YR), pp. 279–290.
DL-1996-ShivakumarG #scalability
Building a Scalable and Accurate Copy Detection Mechanism (NS, HGM), pp. 160–168.
SIGMODSIGMOD-1996-ChawatheRGW
Change Detection in Hierarchically Structured Information (SSC, AR, HGM, JW), pp. 493–504.
SIGMODSIGMOD-1996-Tajima #database #object-oriented #security #static analysis
Static Detection of Security Flaws in Object-Oriented Databases (KT), pp. 341–352.
ICSMEICSM-1996-KhoshgoftaarAHT #lifecycle
Detection of Fault-Prone Software Modules During a Spiral Life Cycle (TMK, EBA, RH, GPT), pp. 69–76.
ICSMEICSM-1996-MayrandLM #automation #empirical #metric #using
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics (JM, CL, EM), p. 244–?.
WCREWCRE-1996-Moore #reverse engineering #rule-based #user interface
Rule-Based Detection for Reverse Engineering User Interfaces (MMM), p. 42–?.
ICPRICPR-1996-Ali #documentation #image
Background noise detection and cleaning in document images (MBHA), pp. 758–762.
ICPRICPR-1996-AmanoHYI #approach #image
Eigen space approach for a pose detection with range images (TA, SH, AY, SI), pp. 622–626.
ICPRICPR-1996-AstromH #analysis #modelling #probability
Stochastic modelling and analysis of sub-pixel edge detection (, AH), pp. 86–90.
ICPRICPR-1996-BalaDHVW #architecture #hybrid #search-based #using #visual notation
Visual routine for eye detection using hybrid genetic architectures (JWB, KD, JH, HV, HW), pp. 606–610.
ICPRICPR-1996-Brailovsky #approach #probability
An approach to outlier detection based on Bayesian probabilistic model (VLB), pp. 70–74.
ICPRICPR-1996-BrancaTAD #composition
Directionality detection in compositional textures (AB, MT, GA, AD), pp. 830–834.
ICPRICPR-1996-ChanY #algorithm
Line detection algorithm (TsC, RKKY), pp. 126–130.
ICPRICPR-1996-ChaudhuriP #fault
OCR error detection and correction of an inflectional Indian language script (BBC, UP), pp. 245–249.
ICPRICPR-1996-Chen #parallel #using
The use of hidden deletable pixel detection to obtain bias-reduced skeletons in parallel thinning (YSC), pp. 91–95.
ICPRICPR-1996-FungLK #2d #random
Randomized generalized Hough transform for 2-D gray scale object detection (PFF, WSL, IK), pp. 511–515.
ICPRICPR-1996-GofmanK #approach #image #optimisation #symmetry
Detecting symmetry in grey level images: the global optimization approach (YG, NK), pp. 889–894.
ICPRICPR-1996-HerpersMSW
Context based detection of keypoints and features in eye regions (RH, MM, GS, LW), pp. 23–28.
ICPRICPR-1996-HotterMM #analysis #estimation #fault #robust #statistics #using
Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
ICPRICPR-1996-IoannouD #image #using
Parallelogram detection in a digital image with the use of the Hough transform (DI, ETD), pp. 532–536.
ICPRICPR-1996-IraniA #2d #3d #approach
A unified approach to moving object detection in 2D and 3D scenes (MI, PA), pp. 712–717.
ICPRICPR-1996-JengLLC #approach #geometry #performance #using
An efficient approach for facial feature detection using geometrical face model (SHJ, HYML, YTL, MYC), pp. 426–430.
ICPRICPR-1996-JiangHF #approach #documentation #performance
A fast approach to detect and correct skew documents (HFJ, CCH, KCF), pp. 742–746.
ICPRICPR-1996-KobatakeM #adaptation
Adaptive filter to detect rounded convex regions: iris filter (HK, MM), pp. 340–344.
ICPRICPR-1996-KunoWSN #automation #visual notation
Automated detection of human for visual surveillance system (YK, NW, YS, SN), pp. 865–869.
ICPRICPR-1996-Kupeev #algorithm #on the
On significant maxima detection: a fine-to-coarse algorithm (KYK), pp. 270–274.
ICPRICPR-1996-LakshmananW #bound #image
Detection of bounded weak echo regions in meteorological radar images (VL, AW), pp. 895–899.
ICPRICPR-1996-LamY #performance
Efficient circular object detection with hypothesis filtering strategy and Hough transform (WCYL, SYY), pp. 542–546.
ICPRICPR-1996-LeTW #adaptation #automation #documentation #image #segmentation
Automated borders detection and adaptive segmentation for binary document images (DXL, GRT, HW), pp. 737–741.
ICPRICPR-1996-LewH
Information theory and face detection (MSL, DPH), pp. 601–605.
ICPRICPR-1996-LinL #using
Detection of specularity using stereo in color and polarization space (SL, SWL), pp. 263–267.
ICPRICPR-1996-LittmannNP #data type #interactive #visual notation
Nonlinear interaction of ON and OFF data streams for the detection of visual structure (EL, HN, LP), pp. 540–544.
ICPRICPR-1996-Matsui #image #multi
A new mathematical human vision model with an autonomous image observing mechanism and its application to multiple motion detection (TM), pp. 723–727.
ICPRICPR-1996-MukherjeePCCK #algorithm #image #performance
An efficient algorithm for detection of road-like structures in satellite images (AM, SKP, DC, BBC, RK), pp. 875–879.
ICPRICPR-1996-MurshedBS #approach #classification #fuzzy #problem
A fuzzy ARTMAP-based classification system for detecting cancerous cells, based on the one-class problem approach (NAM, FB, RS), pp. 478–482.
ICPRICPR-1996-NetanyahuPRS #image #robust
Robust detection of road segments in noisy aerial images (NSN, VP, AR, AJS), pp. 151–155.
ICPRICPR-1996-OhyaK #algorithm #image #search-based #using
Detecting facial expressions from face images using a genetic algorithm (JO, FK), pp. 649–653.
ICPRICPR-1996-ParagiosT #algorithm #using
Detection and location of moving objects using deterministic relaxation algorithms (NP, GT), pp. 201–205.
ICPRICPR-1996-PeiH96a #algorithm #complexity #symmetry
A low complexity algorithm for detecting rotational symmetry based on the Hough transform technique (SCP, JHH), pp. 492–496.
ICPRICPR-1996-Reisfeld
Constrained phase congruency: simultaneous detection of interest points and of their orientational scales (DR), pp. 750–754.
ICPRICPR-1996-RuskoneGAJ #approach #image
Vehicle detection on aerial images: a structural approach (RR, LG, SA, OJ), pp. 900–904.
ICPRICPR-1996-SaberT #cost analysis #feature model #symmetry #using
Face detection and facial feature extraction using color, shape and symmetry-based cost functions (ES, AMT), pp. 654–658.
ICPRICPR-1996-Sablatnig #analysis #automation #flexibility #visual notation
Flexible automatic visual inspection based on the separation of detection and analysis (RS), pp. 944–948.
ICPRICPR-1996-SanchizQP #algorithm
A neural network-based algorithm to detect dominant points from the chain-code of a contour (JMS, JMIQ, FP), pp. 325–329.
ICPRICPR-1996-SatohO #algorithm #comparison
Occlusion detectable stereo-systematic comparison of detection algorithms (KS, YO), pp. 280–286.
ICPRICPR-1996-Singh #recognition #using
Shape detection using gradient features for handwritten character recognition (SPS), pp. 145–149.
ICPRICPR-1996-SpinuGC #approach #distributed #multi #optimisation #problem
A multi-agent approach to edge detection as a distributed optimization problem (CS, CG, JMC), pp. 81–85.
ICPRICPR-1996-StoschekYH #2d #invariant #multi #robust #using
Rotation-invariant and robust multiple-2D-object detection using steerable pyramid denoising and optimized circular harmonic filters (AS, TPYY, RH), pp. 376–380.
ICPRICPR-1996-TakacsW #using
Attention and pattern detection using sensory and reactive control mechanisms (BT, HW), pp. 19–23.
ICPRICPR-1996-TakatooOK #image #using
Detection of objects including persons using image processing (MT, CO, YK), pp. 466–472.
ICPRICPR-1996-VitulanoNVM #using
Edge detection using a new definition of entropy (SV, MN, DV, CM), pp. 141–145.
ICPRICPR-1996-WangF96a #algorithm #geometry #search-based
Detection of geometric shapes by the combination of genetic algorithm and subpixel accuracy (YW, NF), pp. 535–539.
ICPRICPR-1996-WuCY
A fuzzy-theory-based face detector (HW, QC, MY), pp. 406–410.
ICPRICPR-1996-YamamotoMTI0 #automation
Quoit filter-a new filter based on mathematical morphology to extract the isolated shadow, and its application to automatic detection of lung cancer in X-ray CT (SY, MM, YT, TI, TM), pp. 3–7.
ICPRICPR-1996-YipP #representation #using
Detection of moving objects using a spatiotemporal representation (HMY, TCP), pp. 483–487.
ICPRICPR-1996-ZhengB #adaptation #learning
Adaptive object detection based on modified Hebbian learning (YJZ, BB), pp. 164–168.
KDDKDD-1996-ArningAR #database #linear #scalability
A Linear Method for Deviation Detection in Large Databases (AA, RA, PR), pp. 164–169.
KDDKDD-1996-StolorzD #data mining #mining #named #scalability
Quakefinder: A Scalable Data Mining System for Detecting Earthquakes from Space (PES, CD), pp. 208–213.
KDDKDD-1996-WirthR #approach #database #multi
Detecting Early Indicator Cars in an Automotive Database: A Multi-Strategy Approach (RW, TPR), pp. 76–81.
SIGIRSIGIR-1996-LamMMP #information management #personalisation
Detection of Shifts in User Interests for Personalized Information Filtering (WL, SM, JM, MJP), pp. 317–325.
AdaEuropeAdaEurope-1996-ChengU #ada #source code
Tasking Deadlocks in Ada 95 Programs and Their Detection (JC, KU), pp. 135–146.
PLDIPLDI-1996-Evans #fault #memory management #static analysis
Static Detection of Dynamic Memory Errors (DE), pp. 44–53.
ESOPESOP-1996-FradetCM #algorithm #axiom #fault #pointer #static analysis
Static Detection of Pointer Errors: An Axiomatisation and a Checking Algorithm (PF, RC, DLM), pp. 125–140.
TACASTACAS-1996-Holzmann #fault #tool support
Early Fault Detection Tools (GJH), pp. 1–13.
TACASTACAS-1996-Margaria #automation #fault
Fully Automatic Verifcation and Error Detection for Parameterized Iterative Sequential Circuits (TMS), pp. 258–277.
CAVCAV-1996-CapellmannDFGNO #abstraction #behaviour #case study #interactive #network #verification
Verification by Behaviour Abstraction — A Case Study of Service Interaction Detection in Intelligent Telephone Networks (CC, RD, FFV, RGE, UN, PO), pp. 466–469.
ISSTAISSTA-1996-JacksonD #design
Elements of Style: Analyzing a Software Design Feature with a Counterexample Detector (DJ, CD), pp. 239–249.
DL-1995-ShivakumarG #documentation #named
SCAM: A Copy Detection Mechanism for Digital Documents (NS, HGM).
ICDARICDAR-v1-1995-GarciaDPC #analysis #fault #pseudo #recognition #using
Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
ICDARICDAR-v2-1995-AgarwalGHGW
Detection of courtesy amount block on bank checks (AA, LG, KH, AG, PSPW), pp. 748–751.
ICDARICDAR-v2-1995-ChangKRKK #algorithm #documentation #image
Improved binarization algorithm for document image by histogram and edge detection (MSC, SMK, WSR, HGK, DJK), pp. 636–639.
ICDARICDAR-v2-1995-DeforgesB #documentation #image #multi #performance #robust #segmentation
Segmentation of Complex Documents Multilevel Images: A Robust and Fast Text Bodies-Headers Detection and Extraction Scheme 770 (OD, DB), pp. 770–773.
ICDARICDAR-v2-1995-HontaniS #metric #multi
Character detection based on multi-scale measurement (HH, SS), pp. 644–647.
ICDARICDAR-v2-1995-Smith #algorithm #performance
A simple and efficient skew detection algorithm via text row accumulation (RS), pp. 1145–1148.
ICDARICDAR-v2-1995-YuTS #documentation
Document skew detection based on the fractal and least squares method (CLY, YYT, CYS), pp. 1149–1152.
SIGMODSIGMOD-1995-BrinDG #documentation
Copy Detection Mechanisms for Digital Documents (SB, JD, HGM), pp. 398–409.
ICSMEICSM-1995-KhoshgoftaarSV #testing
Detecting program modules with low testability (TMK, RMS, JMV), pp. 242–250.
ICSMEICSM-1995-RugaberSW
Detecting interleaving (SR, KS, LMW), pp. 265–274.
CIKMCIKM-1995-MakkiP #database #distributed
Detection and Resolution of Deadlocks in Distributed Database Systems (KM, NP), pp. 411–416.
CIKMCIKM-1995-ParkST #algorithm #concurrent #distributed #generative #graph #hybrid
A Distributed Deadlock Detection and Resolution Algorithm Based on A Hybrid Wait-for Graph and Probe Generation Scheme (YCP, PS, HLT), pp. 378–386.
SIGIRSIGIR-1995-BooksteinKR #clustering #word
Detecting Content-Bearing Words by Serial Clustering (AB, STK, TR), pp. 319–327.
ESECESEC-1995-KamstiesL #empirical #evaluation
An Empirical Evaluation of Three Defect-Detection Techniques (EK, CML), pp. 362–383.
ICSEICSE-1995-WongHLM #effectiveness #fault #testing
Effect of Test Set Minimization on Fault Detection Effectiveness (WEW, JRH, SL, APM), pp. 41–50.
SACSAC-1995-CrawfordVW #algorithm #multi #search-based #using
Detecting multiple outliers in regression data using genetic algorithms (KDC, DJV, RLW), pp. 351–356.
SACSAC-1995-Stegmaier-StraccaT #classification #fuzzy #using
Cough detection using fuzzy classification (PASS, NNTG), pp. 440–444.
SACSAC-1995-ToliasTP #fuzzy #image
Detecting aneurysms in retinal images: fuzzy morphology vs. conventional methods (YAT, IBT, SMP), pp. 565–569.
PDPPDP-1995-AudenaertL #concurrent #graph #parallel #performance #source code
Space efficient data race detection for parallel programs with series-parallel task graphs (KA, LL), pp. 508–515.
VLDBVLDB-1994-ChakravarthyKAK #database #semantics
Composite Events for Active Databases: Semantics, Contexts and Detection (SC, VK, EA, SKK), pp. 606–617.
ICSMEICSM-1994-Johnson #clone detection #string
Substring Matching for Clone Detection and Change Tracking (JHJ), pp. 120–126.
PLDIPLDI-1994-AustinBS #array #fault #performance #pointer
Efficient Detection of All Pointer and Array Access Errors (TMA, SEB, GSS), pp. 290–301.
POPLPOPL-1994-ProebstingF #pipes and filters
Detecting Pipeline Structural Hazards Quickly (TAP, CWF), pp. 280–286.
SASSAS-1994-Yi #exception #ml #source code #standard
Compile-time Detection of Uncaught Exceptions in Standard ML Programs (KY), pp. 238–254.
ICSEICSE-1994-PorterV #empirical #fault #requirements
An Experiment to Assess Different Defect Detection Methods for Software Requirements Inspections (AAP, LGV), pp. 103–112.
SACSAC-1994-ChenB #analysis #concurrent #database #performance #petri net #transaction
A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection (IRC, RB), pp. 539–544.
SACSAC-1994-DAntoneVGM #fuzzy #parallel
A fuzzy system to detect and count parallel noised tracks (ID, CV, EG, MM), pp. 166–169.
DACDAC-1994-KarriO #architecture #fault #self #synthesis
Area-Efficient Fault Detection During Self-Recovering Microarchitecture Synthesis (RK, AO), pp. 552–556.
DATEEDAC-1994-McGowenF #case study
A Study of Undetectable Non-Feedback Shorts for the Purpose of Physical-DFT (RM, FJF), pp. 371–375.
CADECADE-1994-Bruning
Detecting Non-Provable Goals (SB), pp. 222–236.
ICLPILPS-1994-DebrayGB #logic programming #optimisation #source code
Detection and Optimization of Suspension-free Logic Programs (SKD, DG, PAB), pp. 487–501.
ICDARICDAR-1993-AbeMNK #comparison
Comparison of methods for detecting corner points from digital curves-a preliminary report (KA, RM, KN, TK), pp. 854–857.
ICDARICDAR-1993-BackmutskyZ #fault
Some ergonomic improvements of text error detection and prevention in DTP-systems (VB, VZ), pp. 947–950.
ICDARICDAR-1993-ChenWB #image #keyword #markov #modelling #using
Detecting and locating partially specified keywords in scanned images using hidden Markov models (FC, LW, DSB), pp. 133–138.
ICDARICDAR-1993-FrankeO #classification #statistics
Writing style detection by statistical combination of classifiers in form reader applications (JF, MFO), pp. 581–584.
ICDARICDAR-1993-Ishitani #complexity #documentation
Document skew detection based on local region complexity (YI), pp. 49–52.
ICDARICDAR-1993-LaiK #set
Detection of dimension sets in engineering drawings (CPL, RK), pp. 606–613.
ICDARICDAR-1993-LeplumeyCL #music #robust
A robust detector for music staves (IL, JC, GL), pp. 902–905.
ICDARICDAR-1993-TaiLZ #approach #feature model #modelling #recognition
A model based detecting approach for feature extraction of off-line handwritten Chinese character recognition (JWT, YJL, LQZ), pp. 826–829.
ICDARICDAR-1993-TungL #recognition
2-stage character recognition by detection and correction of erroneously-identified characters (CHT, HJL), pp. 834–837.
ICSMECSM-1993-ChowdhuryM #automation #constraints #maintenance
Facilitating Software Maintenance by Automated Detection of Constraint Violations (AC, SM), pp. 262–271.
HCIHCI-SHI-1993-IshibuchiTK #human-computer #interactive #multi #realtime
Real-Time Multi-Hand Detection for Human-Computer Interaction (KI, HT, FK), pp. 1040–1045.
HCIHCI-SHI-1993-KishinoOTT #3d #image #realtime
Virtual Space Teleconferencing System — Real Time Detection and Reproduction of 3-D Human Images (FK, JO, HT, NT), pp. 669–674.
HCIHCI-SHI-1993-MoriiKT #animation #evaluation #eye tracking #realtime #using
Evaluation of a Gaze Using Real-Time CG Eye-Animation Combined with Eye Movement Detector (KM, FK, NT), pp. 1103–1108.
TOOLSTOOLS-USA-1993-RowleyC #constraints #database #encapsulation #maintenance #named #object-oriented
Detectors: Encapsulating Constraint Maintenance in Object-Oriented Databases (MR, WWC), pp. 439–452.
PLDIPLDI-1993-Adl-TabatabaiG #scheduling
Detection and Recovery of Endangered Variables Caused by Instruction Scheduling (ARAT, TRG), pp. 13–25.
ESECESEC-1993-CheungK #analysis #distributed #source code
Tractable Flow Analysis for Anomaly Detection in Distributed Programs (SCC, JK), pp. 283–300.
ICSEICSE-1993-DunnK #automation #reuse
Automating the Detection of Reusable Parts in Existing Software (MFD, JCK), pp. 381–390.
ICSEICSE-1993-FranklW #comparison #data flow #testing
An Analytical Comparison of the Fault-Detecting Ability of Data Flow Testing Techniques (PGF, EJW), pp. 415–424.
PDPPDP-1993-CinHMP #fault #parallel
Error detection mechanisms for massively parallel multiprocessors (MDC, WH, EM, AP), pp. 401–408.
PDPPDP-1993-ScarabottoloSS #approach #parallel
Edge detection on massively parallel machines: a local threshold approach (NS, DGS, MS), pp. 14–21.
CAVCAV-1993-WolperL #reliability
Reliable Hashing without Collosion Detection (PW, DL), pp. 59–70.
ISSTAISSTA-1993-ThompsonRC #data flow #fault
An Information Flow Model of Fault Detection (MCT, DJR, LAC), pp. 182–192.
ICMLML-1992-SmythM #fault #novel
Detecting Novel Classes with Applications to Fault Diagnosis (PS, JM), pp. 416–425.
AdaEuropeAdaEurope-1992-LanderM #ada #multi #problem #realtime
Detection and Avoidance of Elaboration-Time Problems for Multi-Unit Real-Time Ada Applications (LCL, SM), pp. 165–181.
SASWSA-1992-Kuiper #attribute grammar #parallel
Speeding Up Parallelism Detection for Attribute Grammars (MFK), pp. 152–162.
ESOPESOP-1992-GiacobazziR #abstract interpretation #bottom-up
Detecting Determinate Computations by Bottom-up Abstract Interpretation (RG, LR), pp. 167–181.
STOCSTOC-1992-Ben-David #finite #question
Can Finite Samples Detect Singularities of Real-Valued Functions? (SBD), pp. 390–399.
ICTSSIWPTS-1992-DriraASC #consistency #fault #testing
Characterizing and Ordering Errors Detected by Conformance Testing (KD, PA, BS, AMC), pp. 67–78.
PODSPODS-1991-Chaudhuri #evaluation #query #tuple
Detecting Redundant Tuples During Query Evaluation (SC), pp. 115–126.
PODSPODS-1991-SohnG #logic programming #source code #termination #using
Termination Detection in Logic Programs using Argument Sizes (KS, AVG), pp. 216–226.
RTARTA-1991-KrischerB
Detecting Redundant Narrowing Derivations by the LSE-SL Reducability Test (SK, AB), pp. 74–85.
FPCAFPCA-1991-Fradet #continuation #thread #using
Syntactic Detection of Single-Threading Using Continuations (PF), pp. 241–258.
PEPMPEPM-1991-Lisper #algorithm #partial evaluation
Detecting Static Algorithms by Partial Evaluation (BL), pp. 31–42.
PPDPPLILP-1991-GiannottiH #recursion #specification
A Technique for Recursive Invariance Detection and Selective Program Specification (FG, MVH), pp. 323–334.
PPDPPLILP-1991-LoogenW #functional
Dynamic Detection of Determinism in Functional Languages (RL, SW), pp. 335–346.
ICSEICSE-1991-Jackson #named
Aspect: An Economical Bug-Detector (DJ), pp. 13–22.
ASEKBSE-1991-FrinckeAL #algorithm #approach #automation #concurrent #named
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms (DAF, MA, KNL), pp. 151–160.
ASPLOSASPLOS-1991-MinC #performance
An Efficient Cache-Based Access Anomaly Detection Scheme (SLM, JDC), pp. 235–244.
PPoPPPPoPP-1991-NetzerM #concurrent
Improving the Accuracy of Data Race Detection (RHBN, BPM), pp. 133–144.
ISSTATAV-1991-GuptaS #approach #performance #runtime
Loop Monotonic Computations: An Approach for the Efficient Run-Time Detection of Races (RG, MS), pp. 98–111.
WAGAWAGA-1990-KuiperS #attribute grammar #parallel
Parallel Attribute Evaluation: Structure of Evaluators and Detection of Parallelism (MFK, SDS), pp. 61–75.
PPoPPPPoPP-1990-DinningS #algorithm #comparison #empirical #monitoring
An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection (AD, ES), pp. 1–10.
CAVCAV-1990-PengP #approach #communication #concurrent #finite #network #problem #state machine
A Unified Approach to the Deadlock Detection Problem in Networks of Communicating Finite State Machines (WP, SP), pp. 243–252.
ICLPCLP-1990-InamuraO90 #algorithm
A Detection Algorithm of Perpetual Suspension in KL1 (YI, SO), pp. 18–30.
ICLPCLP-1990-SchreyeVB90 #graph #horn clause #query #strict #using
A Practical Technique for Detecting Non-terminating Queries for a Restricted Class of Horn Clauses, Using Directed, Weighted Graphs (DDS, KV, MB), pp. 649–663.
ICMLML-1989-Spackman #induction #learning #tool support
Signal Detection Theory: Valuable Tools for Evaluating Inductive Learning (KAS), pp. 160–163.
PLDIPLDI-1989-Schonberg #on the fly
On-The-Fly Detection of Access Anomalies (ES), pp. 285–297.
PLDIBest-of-PLDI-1989-Schonberg89a #on the fly
On-the-fly detection of access anomalies (with retrospective) (ES), pp. 313–327.
ICSEICSE-1989-YoungT #fault #taxonomy
Rethinking the Taxonomy of Fault Detection Techniques (MY, RNT), pp. 53–62.
DACDAC-1989-RajsumanJM #fault #using
CMOS Stuck-open Fault Detection Using Single Test Patterns (RR, APJ, YKM), pp. 714–717.
STOCSTOC-1989-CohenM #algorithm #graph #polynomial
Strongly Polynomial-Time and NC Algorithms for Detecting Cycles in Dynamic Graphs (EC, NM), pp. 523–534.
PLDIPLDI-1988-LarusH
Detecting Conflicts Between Structure Accesses (JRL, PNH), pp. 21–34.
POPLPOPL-1988-AlpernWZ #similarity #source code
Detecting Equality of Variables in Programs (BA, MNW, FKZ), pp. 1–11.
STOCSTOC-1988-KosarajuS #graph #polynomial
Detecting Cycles in Dynamic Graphs in Polynomial Time (SRK, GFS), pp. 398–406.
CSLCSL-1988-BuningLS #prolog #source code
Loop Detection in Propositional Prolog Programs (HKB, UL, SS), pp. 148–165.
RTARTA-1987-Purdom
Detecting Looping Simplifications (PWPJ), pp. 54–61.
FPCAFPCA-1987-Goldberg #functional #source code
Detecting sharing of partial applications in functional programs (BG), pp. 408–425.
VLDBVLDB-1986-BlakeleyCL
Updating Derived Relations: Detecting Irrelevant and Autonomously Computable Updates (JAB, NC, PÅL), pp. 457–466.
ICALPICALP-1986-Lai #communication #distributed #termination
A Termination Detector for Static and Dynamic Distributed Systems with Asynchronous Non-first-in-first-out Communication (THL), pp. 196–205.
ICALPICALP-1986-ShavitF #approach
A New Approach to Detection of Locally Indicative Stability (NS, NF), pp. 344–358.
ESOPESOP-1986-Jouvelot #parallel #reduction #semantics
Parallelization by Semantic Detection of Reductions (PJ), pp. 223–236.
ICLPICLP-1986-WarrenD86 #functional #optimisation #prolog
Detection and Optimization of Functional Computations in Prolog (DSW, SKD), pp. 490–504.
STOCSTOC-1985-ValiantV
NP Is as Easy as Detecting Unique Solutions (LGV, VVV), pp. 458–463.
ICSEICSE-1984-Forman #algebra #data flow
An Algebra for Data Flow Anomaly Detection (IRF), pp. 278–287.
DACDAC-1984-ReddyAJ #fault #logic
A gate level model for CMOS combinational logic circuits with application to fault detection (SMR, VDA, SKJ), pp. 504–509.
PODSPODS-1983-KorthKNR #algorithm #comprehension #concurrent #distributed #framework
A Framework for Understanding Distributed (Deadlock Detection) Algorithms (HFK, RK, AN, JTR), pp. 192–202.
DACDAC-1983-ChiangV #fault #logic #network #on the
On fault detection in CMOS logic networks (KWC, ZGV), pp. 50–56.
PODSPODS-1982-Soisalon-SoininenW #algorithm #safety #testing #transaction
An Optimal Algorithm for Testing for Safety and Detecting Deadlocks in Locked Transaction Systems (ESS, DW), pp. 108–116.
ICALPICALP-1982-DobkinK #performance
Fast Detection of Polyhedral Intersections (DPD, DGK), pp. 154–165.
VLDBVLDB-1981-BeeriO #algorithm #concurrent #independence
A Resource Class Independent Deadlock Detection Algorithm (CB, RO), pp. 166–178.
STOCSTOC-1981-Fich #bound #problem
Lower Bounds for the Cycle Detection Problem (FEF), pp. 96–105.
DACDAC-1980-KarpovskyS #component #fault #standard
Detecting bridging and stuck-at faults at input and output pins of standard digital components (MGK, SYHS), pp. 494–505.
STOCSTOC-1980-ChazelleD
Detection is Easier than Computation (BC, DPD), pp. 146–153.
VLDBVLDB-1979-KawazuMIT #algorithm #concurrent #database #distributed
Two-Phase Deadlock Detection Algorithm in Distributed Databases (SK, SM, KI, KT), pp. 360–367.
VLDBVLDB-1979-WilsonS #fault #interactive
A System for Interactive Error Detection (GAW, SBS), pp. 32–51.
ICSEICSE-1979-RiddleBDE #concurrent #source code
Anomaly Detection in Concurrent Programs (WER, GB, CD, BE), pp. 265–273.
DACDAC-1977-BoseS #logic
Detection of static and dynamic hazards in logic nets (AKB, SAS), pp. 220–224.
SIGMODSIGMOD-1976-Macri #concurrent #data transformation
Deadlock Detection and Resolution in a CODASYL Based Data Management System (PPM), pp. 45–49.
ICSEICSE-1976-FosdickO #data flow #interprocedural
The Detection of Anomalous Interprocedural Data Flow (LDF, LJO), pp. 624–628.
DACDAC-1975-Fike #design #fault #predict #question
Predicting fault detectability in combinational circuits — a new design tool? (JLF), pp. 290–295.
DACDAC-1972-Lewis #bound #logic #simulation
Hazard detection by a quinary simulation of logic devices with bounded propagation delays (DWL), pp. 157–164.
DACDAC-1971-KlaytonBL #fault #memory management
Fault detection and diagnosis of memory system faults (ARK, WAB, AIL), pp. 269–277.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.